Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-1130 (GCVE-0-2018-1130)
Vulnerability from cvelistv5
Published
2018-05-10 13:00
Modified
2024-08-05 03:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
unspecified | kernel |
Version: kernel 4.16-rc7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:51:48.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:3083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "USN-3654-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "name": "RHSA-2018:1854", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "name": "USN-3697-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3697-1/" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "USN-3697-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3697-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2" }, { "name": "USN-3654-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "USN-3698-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3698-1/" }, { "name": "USN-3656-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3656-1/" }, { "name": "RHSA-2018:3096", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "name": "[linux-netdev] 20180306 [PATCH net] dccp: check sk for closed state in dccp_sendmsg()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://marc.info/?l=linux-netdev\u0026m=152036596825220\u0026w=2" }, { "name": "USN-3698-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3698-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel", "vendor": "unspecified", "versions": [ { "status": "affected", "version": "kernel 4.16-rc7" } ] } ], "datePublic": "2018-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-31T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2018:3083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "USN-3654-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130" }, { "tags": [ "x_refsource_MISC" ], "url": "https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "name": "RHSA-2018:1854", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "name": "USN-3697-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3697-1/" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "USN-3697-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3697-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2" }, { "name": "USN-3654-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "USN-3698-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3698-1/" }, { "name": "USN-3656-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3656-1/" }, { "name": "RHSA-2018:3096", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "name": "[linux-netdev] 20180306 [PATCH net] dccp: check sk for closed state in dccp_sendmsg()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://marc.info/?l=linux-netdev\u0026m=152036596825220\u0026w=2" }, { "name": "USN-3698-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3698-2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-1130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_value": "kernel 4.16-rc7" } ] } } ] }, "vendor_name": "" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:3083", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "USN-3654-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3654-1/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130" }, { "name": "https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94", "refsource": "MISC", "url": "https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html" }, { "name": "RHSA-2018:1854", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "name": "USN-3697-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3697-1/" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "USN-3697-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3697-2/" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2" }, { "name": "USN-3654-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "USN-3698-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3698-1/" }, { "name": "USN-3656-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3656-1/" }, { "name": "RHSA-2018:3096", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "name": "[linux-netdev] 20180306 [PATCH net] dccp: check sk for closed state in dccp_sendmsg()", "refsource": "MLIST", "url": "https://marc.info/?l=linux-netdev\u0026m=152036596825220\u0026w=2" }, { "name": "USN-3698-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3698-2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-1130", "datePublished": "2018-05-10T13:00:00", "dateReserved": "2017-12-04T00:00:00", "dateUpdated": "2024-08-05T03:51:48.970Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-1130\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-05-10T13:29:00.297\",\"lastModified\":\"2024-11-21T03:59:15.237\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.\"},{\"lang\":\"es\",\"value\":\"El kernel de Linux en versiones anteriores a la 4.16-rc7 es vulnerable a una desreferencia de puntero NULL en la funci\u00f3n dccp_write_xmit() en net/dccp/output.c en la que un usuario local puede provocar una denegaci\u00f3n de servicio mediante un n\u00famero de llamadas del sistema manipuladas.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.16\",\"matchCriteriaId\":\"377F5B77-1BED-4B04-84A7-A585DCD2C01C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7161042-96AB-4B27-85D1-284F7F975B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"023AC641-A30A-4814-8EEE-E8290134B8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B70E4A9-D27F-4318-85DF-30CE6E86194B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E280740-2FD3-459D-AF37-624DC6171F8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2A106F-944D-42C5-BB4B-E81B97A57CDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.16:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B14098E0-F40A-4C8E-B285-E96E6E604582\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1854\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3083\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3096\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://marc.info/?l=linux-netdev\u0026m=152036596825220\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3656-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3697-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3697-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3698-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3698-2/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1854\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3096\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f93df79aeefc3add4e4b31a752600f834236e2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://marc.info/?l=linux-netdev\u0026m=152036596825220\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"https://syzkaller.appspot.com/bug?id=833568de043e0909b2aeaef7be136db39d21ba94\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3654-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3656-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3697-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3697-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3698-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3698-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2018:1762-1
Vulnerability from csaf_suse
Published
2018-06-20 09:43
Modified
2018-06-20 09:43
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
registers) between processes. These registers might contain encryption keys
when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
ioctl (bsc#1096728)
- CVE-2017-13305: Prevent information disclosure vulnerability in
encrypted-keys (bsc#1094353)
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
crc32c checksum driver, which allowed attackers to cause a denial of service
(ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
ext4 image (bsc#1087007)
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
cause a denial of service (out-of-bounds read and system crash) via a crafted
ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers
(bsc#1087095)
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
with a zero i_links_count, which allowed attackers to cause a denial of service
(ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
image (bsc#1087012)
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bsc#1092904)
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
handling SCTP packets length that could have been exploited to cause a kernel
crash (bnc#1083900)
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
__rds_rdma_map() function that allowed local attackers to cause a system panic
and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
(bsc#1082962)
The following non-security bugs were fixed:
- Fix excessive newline in /proc/*/status (bsc#1094823).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- kABI: work around BPF SSBD removal (bsc#1087082).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1096281).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096281).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-1184,SUSE-SLE-SERVER-12-2018-1184
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO\n ioctl (bsc#1096728)\n- CVE-2017-13305: Prevent information disclosure vulnerability in\n encrypted-keys (bsc#1094353)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007)\n- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to\n cause a denial of service (out-of-bounds read and system crash) via a crafted\n ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095)\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012)\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n\nThe following non-security bugs were fixed:\n\n- Fix excessive newline in /proc/*/status (bsc#1094823).\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).\n- kABI: work around BPF SSBD removal (bsc#1087082).\n- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1096281).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096281).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)\n- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-1184,SUSE-SLE-SERVER-12-2018-1184", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1762-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1762-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181762-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1762-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004206.html" }, { "category": "self", "summary": "SUSE Bug 1046610", "url": "https://bugzilla.suse.com/1046610" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1087007", "url": "https://bugzilla.suse.com/1087007" }, { "category": "self", "summary": "SUSE Bug 1087012", "url": "https://bugzilla.suse.com/1087012" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087086", "url": "https://bugzilla.suse.com/1087086" }, { "category": "self", "summary": "SUSE Bug 1087095", "url": "https://bugzilla.suse.com/1087095" }, { "category": "self", "summary": "SUSE Bug 1092552", "url": "https://bugzilla.suse.com/1092552" }, { "category": "self", "summary": "SUSE Bug 1092813", "url": "https://bugzilla.suse.com/1092813" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094033", "url": "https://bugzilla.suse.com/1094033" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1096140", "url": "https://bugzilla.suse.com/1096140" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1092 page", "url": "https://www.suse.com/security/cve/CVE-2018-1092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1093 page", "url": "https://www.suse.com/security/cve/CVE-2018-1093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1094 page", "url": "https://www.suse.com/security/cve/CVE-2018-1094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-06-20T09:43:56Z", "generator": { "date": "2018-06-20T09:43:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1762-1", "initial_release_date": "2018-06-20T09:43:56Z", "revision_history": [ { "date": "2018-06-20T09:43:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.136.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.136.1.noarch", "product_id": "kernel-devel-3.12.61-52.136.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.136.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.136.1.noarch", "product_id": "kernel-macros-3.12.61-52.136.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.136.1.noarch", "product": { "name": "kernel-source-3.12.61-52.136.1.noarch", "product_id": "kernel-source-3.12.61-52.136.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.136.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.136.1.ppc64le", "product_id": "kernel-default-3.12.61-52.136.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.136.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.136.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.136.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.136.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.136.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.136.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.136.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.136.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.136.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.136.1.s390x", "product": { "name": "kernel-default-3.12.61-52.136.1.s390x", "product_id": "kernel-default-3.12.61-52.136.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.136.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.136.1.s390x", "product_id": "kernel-default-base-3.12.61-52.136.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.136.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.136.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.136.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.136.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.136.1.s390x", "product_id": "kernel-default-man-3.12.61-52.136.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.136.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.136.1.s390x", "product_id": "kernel-syms-3.12.61-52.136.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.136.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.136.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.136.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.136.1.x86_64", "product_id": "kernel-default-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.136.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.136.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.136.1.x86_64", "product_id": "kernel-syms-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.136.1.x86_64", "product_id": "kernel-xen-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.136.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.136.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.136.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.136.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.136.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.136.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.136.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.136.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.136.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.136.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.136.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.136.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.136.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.136.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.136.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.136.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.136.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.136.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.136.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.136.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.136.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.136.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.136.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.136.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.136.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.136.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.136.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.136.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.136.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.136.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1092" } ], "notes": [ { "category": "general", "text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1092", "url": "https://www.suse.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "SUSE Bug 1087012 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087012" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1093" } ], "notes": [ { "category": "general", "text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1093", "url": "https://www.suse.com/security/cve/CVE-2018-1093" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087095 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087095" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1094" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1094", "url": "https://www.suse.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "SUSE Bug 1087007 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087007" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-1094" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "important" } ], "title": "CVE-2018-5848" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.136.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.136.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_136-xen-1-1.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:56Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:1761-1
Vulnerability from csaf_suse
Published
2018-06-20 09:43
Modified
2018-06-20 09:43
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
registers) between processes. These registers might contain encryption keys
when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
ioctl (bsc#1096728)
- CVE-2017-13305: Prevent information disclosure vulnerability in
encrypted-keys (bsc#1094353)
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
crc32c checksum driver, which allowed attackers to cause a denial of service
(ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
ext4 image (bsc#1087007).
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
cause a denial of service (out-of-bounds read and system crash) via a crafted
ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers
(bsc#1087095).
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
with a zero i_links_count, which allowed attackers to cause a denial of service
(ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
image (bsc#1087012).
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bsc#1092904)
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
handling SCTP packets length that could have been exploited to cause a kernel
crash (bnc#1083900)
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
__rds_rdma_map() function that allowed local attackers to cause a system panic
and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
(bsc#1082962)
The following non-security bugs were fixed:
- Btrfs: fix unexpected balance crash due to BUG_ON (bsc#1038553).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- dm thin metadata: call precommit before saving the roots (bsc#1083382).
- dm thin: fix inability to discard blocks when in out-of-data-space mode (bsc#1083382).
- dm thin: fix missing out-of-data-space to write mode transition if blocks are released (bsc#1083382).
- dm thin: restore requested 'error_if_no_space' setting on OODS to WRITE transition (bsc#1083382).
- dm: fix various targets to dm_register_target after module __init resources created (bsc#1083382).
- kABI: work around BPF SSBD removal (bsc#1087082).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).
- x86/boot: Fix early command-line parsing when matching at end (bsc#1096281).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096281).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2018-1183,SUSE-SLE-SAP-12-SP1-2018-1183,SUSE-SLE-SERVER-12-SP1-2018-1183
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO\n ioctl (bsc#1096728)\n- CVE-2017-13305: Prevent information disclosure vulnerability in\n encrypted-keys (bsc#1094353)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007).\n- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to\n cause a denial of service (out-of-bounds read and system crash) via a crafted\n ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095).\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012).\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n\nThe following non-security bugs were fixed:\n\n- Btrfs: fix unexpected balance crash due to BUG_ON (bsc#1038553).\n- Fix excessive newline in /proc/*/status (bsc#1094823).\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- dm thin metadata: call precommit before saving the roots (bsc#1083382).\n- dm thin: fix inability to discard blocks when in out-of-data-space mode (bsc#1083382).\n- dm thin: fix missing out-of-data-space to write mode transition if blocks are released (bsc#1083382).\n- dm thin: restore requested \u0027error_if_no_space\u0027 setting on OODS to WRITE transition (bsc#1083382).\n- dm: fix various targets to dm_register_target after module __init resources created (bsc#1083382).\n- kABI: work around BPF SSBD removal (bsc#1087082).\n- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).\n- x86/boot: Fix early command-line parsing when matching at end (bsc#1096281).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096281).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)\n- xen-netfront: fix req_prod check to avoid RX hang when index wraps (bsc#1046610).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2018-1183,SUSE-SLE-SAP-12-SP1-2018-1183,SUSE-SLE-SERVER-12-SP1-2018-1183", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1761-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1761-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181761-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1761-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004205.html" }, { "category": "self", "summary": "SUSE Bug 1038553", "url": "https://bugzilla.suse.com/1038553" }, { "category": "self", "summary": "SUSE Bug 1046610", "url": "https://bugzilla.suse.com/1046610" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083382", "url": "https://bugzilla.suse.com/1083382" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1087007", "url": "https://bugzilla.suse.com/1087007" }, { "category": "self", "summary": "SUSE Bug 1087012", "url": "https://bugzilla.suse.com/1087012" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087086", "url": "https://bugzilla.suse.com/1087086" }, { "category": "self", "summary": "SUSE Bug 1087095", "url": "https://bugzilla.suse.com/1087095" }, { "category": "self", "summary": "SUSE Bug 1092813", "url": "https://bugzilla.suse.com/1092813" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094033", "url": "https://bugzilla.suse.com/1094033" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1096140", "url": "https://bugzilla.suse.com/1096140" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1092 page", "url": "https://www.suse.com/security/cve/CVE-2018-1092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1093 page", "url": "https://www.suse.com/security/cve/CVE-2018-1093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1094 page", "url": "https://www.suse.com/security/cve/CVE-2018-1094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-06-20T09:43:16Z", "generator": { "date": "2018-06-20T09:43:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1761-1", "initial_release_date": "2018-06-20T09:43:16Z", "revision_history": [ { "date": "2018-06-20T09:43:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.96.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.96.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.96.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.96.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.96.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.96.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.96.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.96.1.noarch", "product_id": "kernel-source-3.12.74-60.64.96.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.96.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.96.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.96.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.96.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.96.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.96.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.96.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.96.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.96.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.96.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.96.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.96.1.s390x", "product_id": "kernel-default-3.12.74-60.64.96.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.96.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.96.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.96.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.96.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.96.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.96.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.96.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.96.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.96.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.96.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.96.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.96.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.96.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.96.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.96.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.96.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.96.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.96.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.96.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.96.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.96.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.96.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.96.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.96.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.96.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.96.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.96.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.96.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.96.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.96.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1092" } ], "notes": [ { "category": "general", "text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1092", "url": "https://www.suse.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "SUSE Bug 1087012 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087012" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1093" } ], "notes": [ { "category": "general", "text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1093", "url": "https://www.suse.com/security/cve/CVE-2018-1093" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087095 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087095" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1094" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1094", "url": "https://www.suse.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "SUSE Bug 1087007 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087007" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-1094" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "important" } ], "title": "CVE-2018-5848" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.96.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.96.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_96-xen-1-2.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-20T09:43:16Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:1366-1
Vulnerability from csaf_suse
Published
2018-05-22 11:33
Modified
2018-05-22 11:33
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.131 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3639: Information leaks using 'Memory Disambiguation' feature
in modern CPUs were mitigated, aka 'Spectre Variant 4' (bnc#1087082).
A new boot commandline option was introduced,
'spec_store_bypass_disable', which can have following values:
- auto: Kernel detects whether your CPU model contains an implementation
of Speculative Store Bypass and picks the most appropriate mitigation.
- on: disable Speculative Store Bypass
- off: enable Speculative Store Bypass
- prctl: Control Speculative Store Bypass per thread via
prctl. Speculative Store Bypass is enabled for a process by default. The
state of the control is inherited on fork.
- seccomp: Same as 'prctl' above, but all seccomp threads will disable
SSB unless they explicitly opt out.
The default is 'seccomp', meaning programs need explicit opt-in into the mitigation.
Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:
- 'Vulnerable'
- 'Mitigation: Speculative Store Bypass disabled'
- 'Mitigation: Speculative Store Bypass disabled via prctl'
- 'Mitigation: Speculative Store Bypass disabled via prctl and seccomp'
- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c
had an integer-overflow vulnerability allowing local users with access
to the udldrmfb driver to obtain full read and write permissions on
kernel physical pages, resulting in a code execution in kernel space
(bnc#1090643).
- CVE-2018-10124: The kill_something_info function in kernel/signal.c
might have allowed local users to cause a denial of service via an
INT_MIN argument (bnc#1089752).
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might
have allowed local users to cause a denial of service by triggering an
attempted use of the -INT_MIN value (bnc#1089608).
- CVE-2018-1000199: An address corruption flaw was discovered while
modifying a h/w breakpoint via 'modify_user_hw_breakpoint' routine, an
unprivileged user/process could use this flaw to crash the system kernel
resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)
- CVE-2018-1130: The Linux kernel was vulnerable to a null pointer
dereference in dccp_write_xmit() function in net/dccp/output.c in that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bnc#1092904).
- CVE-2018-5803: An error in the _sctp_make_chunk() function when handling
SCTP, packet length could have been exploited by a malicious local user
to cause a kernel crash and a DoS. (bnc#1083900).
- CVE-2018-1065: The netfilter subsystem mishandled the case of
a rule blob that contains a jump but lacks a user-defined chain,
which allowed local users to cause a denial of service (NULL
pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN
capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c,
ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in
net/ipv6/netfilter/ip6_tables.c (bnc#1083650 1091925).
- CVE-2018-7492: A NULL pointer dereference was found in the
net/rds/rdma.c __rds_rdma_map() function allowing local attackers to
cause a system panic and a denial-of-service, related to RDS_GET_MR and
RDS_GET_MR_FOR_DEST (bnc#1082962).
The following non-security bugs were fixed:
- acpica: Disassembler: Abort on an invalid/unknown AML opcode (bnc#1012382).
- acpica: Events: Add runtime stub support for event APIs (bnc#1012382).
- acpi / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).
- acpi, PCI, irq: remove redundant check for null string pointer (bnc#1012382).
- acpi / scan: Send change uevent with offine environmental data (bsc#1082485).
- acpi / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).
- alsa: asihpi: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: control: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).
- alsa: hda: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: hda - New VIA controller suppor no-snoop path (bnc#1012382).
- alsa: hda/realtek - Add some fixes for ALC233 (bnc#1012382).
- alsa: hdspm: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: line6: Use correct endpoint type for midi output (bnc#1012382).
- alsa: opl3: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).
- alsa: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).
- alsa: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).
- alsa: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).
- alsa: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).
- alsa: pcm: potential uninitialized return values (bnc#1012382).
- alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).
- alsa: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bnc#1012382).
- alsa: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).
- alsa: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).
- alsa: rme9652: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).
- alsa: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).
- alsa: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).
- arm64: avoid overflow in VA_START and PAGE_OFFSET (bnc#1012382).
- arm64: futex: Fix undefined behaviour with FUTEX_OP_OPARG_SHIFT usage (bnc#1012382).
- arm: amba: Do not read past the end of sysfs 'driver_override' buffer (bnc#1012382).
- arm: amba: Fix race condition with driver_override (bnc#1012382).
- arm: amba: Make driver_override output consistent with other buses (bnc#1012382).
- arm: davinci: da8xx: Create DSP device only when assigned memory (bnc#1012382).
- arm: dts: am57xx-beagle-x15-common: Add overide powerhold property (bnc#1012382).
- arm: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).
- arm: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).
- arm: dts: dra7: Add power hold and power controller properties to palmas (bnc#1012382).
- arm: dts: imx53-qsrb: Pulldown PMIC IRQ pin (bnc#1012382).
- arm: dts: imx6qdl-wandboard: Fix audio channel swap (bnc#1012382).
- arm: dts: ls1021a: add 'fsl,ls1021a-esdhc' compatible string to esdhc node (bnc#1012382).
- arm: imx: Add MXC_CPU_IMX6ULL and cpu_is_imx6ull (bnc#1012382).
- arp: fix arp_filter on l3slave devices (bnc#1012382).
- arp: honour gratuitous ARP _replies_ (bnc#1012382).
- asoc: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).
- asoc: Intel: cht_bsw_rt5645: Analog Mic support (bnc#1012382).
- asoc: rsnd: SSI PIO adjust to 24bit mode (bnc#1012382).
- asoc: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).
- async_tx: Fix DMA_PREP_FENCE usage in do_async_gen_syndrome() (bnc#1012382).
- ata: libahci: properly propagate return value of platform_get_irq() (bnc#1012382).
- ath5k: fix memory leak on buf on failed eeprom read (bnc#1012382).
- ath9k_hw: check if the chip failed to wake up (bnc#1012382).
- audit: add tty field to LOGIN event (bnc#1012382).
- autofs: mount point create should honour passed in mode (bnc#1012382).
- bcache: segregate flash only volume write streams (bnc#1012382).
- bcache: stop writeback thread after detaching (bnc#1012382).
- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)
- blk-mq: fix bad clear of RQF_MQ_INFLIGHT in blk_mq_ct_ctx_init() (bsc#1085058).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bnc#1012382).
- block: correctly mask out flags in blk_rq_append_bio() (bsc#1085058).
- block/loop: fix deadlock after loop_set_status (bnc#1012382).
- block: sanity check for integrity intervals (bsc#1091728).
- bluetooth: Fix missing encryption refresh on Security Request (bnc#1012382).
- bluetooth: Send HCI Set Event Mask Page 2 command only when needed (bnc#1012382).
- bna: Avoid reading past end of buffer (bnc#1012382).
- bnx2x: Allow vfs to disable txvlan offload (bnc#1012382).
- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).
- bonding: Do not update slave->link until ready to commit (bnc#1012382).
- bonding: fix the err path for dev hwaddr sync in bond_enslave (bnc#1012382).
- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (bnc#1012382).
- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (bnc#1012382).
- btrfs: fix incorrect error return ret being passed to mapping_set_error (bnc#1012382).
- btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).
- btrfs: Only check first key for committed tree blocks (bsc#1084721).
- btrfs: Validate child tree block's level and first key (bsc#1084721).
- bus: brcmstb_gisb: correct support for 64-bit address output (bnc#1012382).
- bus: brcmstb_gisb: Use register offsets with writes too (bnc#1012382).
- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).
- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).
- ceph: adding protection for showing cap reservation info (bsc#1089115).
- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).
- ceph: check if mds create snaprealm when setting quota (fate#324665 bsc#1089115).
- ceph: do not check quota for snap inode (fate#324665 bsc#1089115).
- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).
- ceph: fix root quota realm check (fate#324665 bsc#1089115).
- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).
- ceph: quota: add counter for snaprealms with quota (fate#324665 bsc#1089115).
- ceph: quota: add initial infrastructure to support cephfs quotas (fate#324665 bsc#1089115).
- ceph: quota: cache inode pointer in ceph_snap_realm (fate#324665 bsc#1089115).
- ceph: quota: do not allow cross-quota renames (fate#324665 bsc#1089115).
- ceph: quota: report root dir quota usage in statfs (fate#324665 bsc#1089115).
- ceph: quota: support for ceph.quota.max_bytes (fate#324665 bsc#1089115).
- ceph: quota: support for ceph.quota.max_files (fate#324665 bsc#1089115).
- ceph: quota: update MDS when max_bytes is approaching (fate#324665 bsc#1089115).
- cfg80211: make RATE_INFO_BW_20 the default (bnc#1012382).
- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).
- cifs: silence lockdep splat in cifs_relock_file() (bnc#1012382).
- cifs: Use file_dentry() (bsc#1093008).
- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).
- clk: Fix __set_clk_rates error print-string (bnc#1012382).
- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).
- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).
- clk: scpi: fix return type of __scpi_dvfs_round_rate (bnc#1012382).
- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).
- cpumask: Add helper cpumask_available() (bnc#1012382).
- crypto: ahash - Fix early termination in hash walk (bnc#1012382).
- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bnc#1012382).
- cx25840: fix unchecked return values (bnc#1012382).
- cxgb4: fix incorrect cim_la output for T6 (bnc#1012382).
- cxgb4: Fix queue free path of ULD drivers (bsc#1022743 FATE#322540).
- cxgb4: FW upgrade fixes (bnc#1012382).
- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bnc#1012382).
- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).
- dmaengine: imx-sdma: Handle return value of clk_prepare_enable (bnc#1012382).
- dm ioctl: remove double parentheses (bnc#1012382).
- Documentation: pinctrl: palmas: Add ti,palmas-powerhold-override property definition (bnc#1012382).
- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).
- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (FATE#321732).
- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bnc#1024296,FATE#321265).
- drivers/misc/vmw_vmci/vmci_queue_pair.c: fix a couple integer overflow tests (bnc#1012382).
- drm/omap: fix tiled buffer stride calculations (bnc#1012382).
- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).
- drm/virtio: fix vq wait_event condition (bnc#1012382).
- e1000e: fix race condition around skb_tstamp_tx() (bnc#1012382).
- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bnc#1012382).
- edac, mv64x60: Fix an error handling path (bnc#1012382).
- Enable uinput driver (bsc#1092566).
- esp: Fix memleaks on error paths (git-fixes).
- ext4: add validity checks for bitmap block numbers (bnc#1012382).
- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).
- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).
- ext4: fix bitmap position validation (bnc#1012382).
- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ext4: fix off-by-one on max nr_pages in ext4_find_unwritten_pgoff() (bnc#1012382).
- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).
- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).
- fanotify: fix logic of events on child (bnc#1012382).
- fix race in drivers/char/random.c:get_reg() (bnc#1012382).
- frv: declare jiffies to be located in the .data section (bnc#1012382).
- fs: compat: Remove warning from COMPATIBLE_IOCTL (bnc#1012382).
- fs/proc: Stop trying to report thread stacks (bnc#1012382).
- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).
- genirq: Use cpumask_available() for check of cpumask variable (bnc#1012382).
- getname_kernel() needs to make sure that ->name != ->iname in long case (bnc#1012382).
- gpio: label descriptors using the device name (bnc#1012382).
- hdlcdrv: Fix divide by zero in hdlcdrv_ioctl (bnc#1012382).
- hid: core: Fix size as type u32 (bnc#1012382).
- hid: Fix hid_report_len usage (bnc#1012382).
- hid: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).
- hid: i2c-hid: fix size check and type usage (bnc#1012382).
- hwmon: (ina2xx) Fix access to uninitialized mutex (git-fixes).
- hwmon: (ina2xx) Make calibration register value fixed (bnc#1012382).
- hypfs_kill_super(): deal with failed allocations (bnc#1012382).
- i40iw: Free IEQ resources (bsc#969476 FATE#319648 bsc#969477 FATE#319816).
- ib/core: Fix possible crash to access NULL netdev (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/core: Generate GID change event regardless of RoCE GID table property (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx4: Fix corruption of RoCEv2 IPv4 GIDs (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx4: Include GID type when deleting GIDs from HW table under RoCE (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- ib/mlx5: Avoid passing an invalid QP type to firmware (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Fix an error code in __mlx5_ib_modify_qp() (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix incorrect size of klms in the memory region (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: Fix out-of-bounds read in create_raw_packet_qp_rq (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- ib/mlx5: revisit -Wmaybe-uninitialized warning (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ib/mlx5: Set the default active rate and width to QDR and 4X (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).
- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).
- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).
- ibmvnic: Handle all login error conditions (bsc#1089198).
- ib/srp: Fix completion vector assignment algorithm (bnc#1012382).
- ib/srp: Fix srp_abort() (bnc#1012382).
- ib/srpt: Fix abort handling (bnc#1012382).
- ib/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bnc#1024296,FATE#321265).
- iio: hi8435: avoid garbage event at first enable (bnc#1012382).
- iio: hi8435: cleanup reset gpio (bnc#1012382).
- iio: magnetometer: st_magn_spi: fix spi_device_id table (bnc#1012382).
- input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).
- input: ALPS - fix trackstick button handling on V8 devices (git-fixes).
- input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).
- input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).
- input: drv260x - fix initializing overdrive voltage (bnc#1012382).
- input: elan_i2c - check if device is there before really probing (bnc#1012382).
- input: elan_i2c - clear INT before resetting controller (bnc#1012382).
- input: elantech - force relative mode on a certain module (bnc#1012382).
- input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bnc#1012382).
- input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bnc#1012382).
- input: mousedev - fix implicit conversion warning (bnc#1012382).
- iommu/vt-d: Fix a potential memory leak (bnc#1012382).
- ip6_gre: better validate user provided tunnel names (bnc#1012382).
- ip6_tunnel: better validate user provided tunnel names (bnc#1012382).
- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).
- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799). Refresh patch to mainline version.
- ipsec: check return value of skb_to_sgvec always (bnc#1012382).
- ip_tunnel: better validate user provided tunnel names (bnc#1012382).
- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).
- ipv6: avoid dad-failures for addresses with NODAD (bnc#1012382).
- ipv6: sit: better validate user provided tunnel names (bnc#1012382).
- ipv6: the entire IPv6 header chain must fit the first fragment (bnc#1012382).
- iw_cxgb4: print mapped ports correctly (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).
- jbd2: fix use after free in kjournald2() (bnc#1012382).
- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).
- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).
- jiffies.h: declare jiffies and jiffies_64 with ____cacheline_aligned_in_smp (bnc#1012382).
- kABI: add tty include to audit.c (kabi).
- kABI: protect hid report functions (kabi).
- kABI: protect jiffies types (kabi).
- kABI: protect skb_to_sgvec* (kabi).
- kABI: protect sound/timer.h include in sound pcm.c (kabi).
- kABI: protect struct cstate (kabi).
- kABI: protect struct _lowcore (kabi).
- kABI: protect tty include in audit.h (kabi).
- kabi/severities: Ignore kgr_shadow_* kABI changes
- kbuild: provide a __UNIQUE_ID for clang (bnc#1012382).
- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).
- keys: DNS: limit the length of option strings (bnc#1012382).
- kGraft: fix small race in reversion code (bsc#1083125).
- kobject: do not use WARN for registration failures (bnc#1012382).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: nVMX: Fix handling of lmsw instruction (bnc#1012382).
- kvm: PPC: Book3S PR: Check copy_to/from_user return values (bnc#1012382).
- kvm: SVM: do not zero out segment attributes if segment is unusable or not present (bnc#1012382).
- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).
- l2tp: fix missing print session offset info (bnc#1012382).
- lan78xx: Correctly indicate invalid OTP (bnc#1012382).
- leds: pca955x: Correct I2C Functionality (bnc#1012382).
- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).
- libceph: fix misjudgement of maximum monitor number (bsc#1089115).
- libceph: reschedule a tick in finish_hunting() (bsc#1089115).
- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).
- libceph: validate con->state at the top of try_write() (bsc#1089115).
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).
- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).
- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).
- llc: hold llc_sap before release_sock() (bnc#1012382).
- llist: clang: introduce member_address_is_nonnull() (bnc#1012382).
- lockd: fix lockd shutdown race (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (git-fixes).
- mac80211: bail out from prep_connection() if a reconfig is ongoing (bnc#1012382).
- mceusb: sporadic RX truncation corruption fix (bnc#1012382).
- md: document lifetime of internal rdev pointer (bsc#1056415).
- md: fix two problems with setting the 're-add' device state (bsc#1089023).
- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).
- md raid10: fix NULL deference in handle_write_completed() (git-fixes).
- md/raid10: reset the 'first' at the end of loop (bnc#1012382).
- md/raid5: make use of spin_lock_irq over local_irq_disable + spin_lock (bnc#1012382).
- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).
- media: videobuf2-core: do not go out of the buffer range (bnc#1012382).
- mei: remove dev_err message on an unsupported ioctl (bnc#1012382).
- mISDN: Fix a sleep-in-atomic bug (bnc#1012382).
- mlx5: fix bug reading rss_hash_type from CQE (bnc#1012382).
- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).
- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).
- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).
- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).
- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bnc#1012382).
- neighbour: update neigh timestamps iff update is effective (bnc#1012382).
- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).
- net: cavium: liquidio: fix up 'Avoid dma_unmap_single on uninitialized ndata' (bnc#1012382).
- net: cdc_ncm: Fix TX zero padding (bnc#1012382).
- net: emac: fix reset timeout with AR8035 phy (bnc#1012382).
- net: ethernet: ti: cpsw: adjust cpsw fifos depth for fullduplex flow control (bnc#1012382).
- netfilter: bridge: ebt_among: add more missing match size checks (bnc#1012382).
- netfilter: ctnetlink: fix incorrect nf_ct_put during hash resize (bnc#1012382).
- netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch (bnc#1012382).
- netfilter: nf_nat_h323: fix logical-not-parentheses warning (bnc#1012382).
- netfilter: x_tables: add and use xt_check_proc_name (bnc#1012382).
- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).
- net: fix possible out-of-bound read in skb_network_protocol() (bnc#1012382).
- net: fool proof dev_valid_name() (bnc#1012382).
- net: freescale: fix potential null pointer dereference (bnc#1012382).
- net: hns: Fix ethtool private flags (bnc#1012382 bsc#1085511).
- net: ieee802154: fix net_device reference release too early (bnc#1012382).
- net/ipv6: Fix route leaking between VRFs (bnc#1012382).
- net/ipv6: Increment OUTxxx counters after netfilter hook (bnc#1012382).
- netlink: make sure nladdr has correct size in netlink_connect() (bnc#1012382).
- net: llc: add lock_sock in llc_ui_bind to avoid a race condition (bnc#1012382).
- net/mlx4: Check if Granular QoS per VF has been enabled before updating QP qos_vport (bnc#1012382).
- net/mlx4_core: Fix memory leak while delete slave's resources (bsc#966191 FATE#320230 bsc#966186 FATE#320228).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bnc#1012382).
- net/mlx4_en: Fix mixed PFC and Global pause user control requests (bsc#1015336 FATE#321685 bsc#1015337 FATE#321686 bsc#1015340 FATE#321687).
- net/mlx4: Fix the check in attaching steering rules (bnc#1012382).
- net/mlx5: avoid build warning for uniprocessor (bnc#1012382).
- net/mlx5e: Add error print in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: Check support before TC swap in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).
- net/mlx5e: E-Switch, Use the name of static array instead of its address (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix error handling in load one (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Fix ingress/egress naming mistake (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- net/mlx5: Tolerate irq_set_affinity_hint() failures (bnc#1012382).
- net: move somaxconn init from sysctl code (bnc#1012382).
- net: phy: avoid genphy_aneg_done() for PHYs without clause 22 support (bnc#1012382).
- net: qca_spi: Fix alignment issues in rx path (bnc#1012382).
- net sched actions: fix dumping which requires several messages to user space (bnc#1012382).
- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bnc#1012382).
- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).
- net: x25: fix one potential use-after-free issue (bnc#1012382).
- net: xfrm: use preempt-safe this_cpu_read() in ipcomp_alloc_tfms() (bnc#1012382).
- nfsv4.1: RECLAIM_COMPLETE must handle NFS4ERR_CONN_NOT_BOUND_TO_SESSION (bnc#1012382).
- nfsv4.1: Work around a Linux server bug.. (bnc#1012382).
- nospec: Kill array_index_nospec_mask_check() (bnc#1012382).
- nospec: Move array_index_nospec() parameter checking into separate macro (bnc#1012382).
- ovl: filter trusted xattr for non-admin (bnc#1012382).
- packet: fix bitfield update race (bnc#1012382).
- parisc: Fix out of array access in match_pci_device() (bnc#1012382).
- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bnc#1012382).
- partitions/msdos: Unable to mount UFS 44bsd partitions (bnc#1012382).
- pci/cxgb4: Extend T3 PCI quirk to T4+ devices (bsc#981348).
- pci: Make PCI_ROM_ADDRESS_MASK a 32-bit constant (bnc#1012382).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1012382).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf header: Set proper module name when build-id event found (bnc#1012382).
- perf/hwbp: Simplify the perf-hwbp code, fix documentation (bnc#1012382).
- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).
- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).
- perf intel-pt: Fix sync_switch (bnc#1012382).
- perf intel-pt: Fix timestamp following overflow (bnc#1012382).
- perf probe: Add warning message if there is unexpected event name (bnc#1012382).
- perf report: Ensure the perf DSO mapping matches what libdw sees (bnc#1012382).
- perf: Return proper values for user stack errors (bnc#1012382).
- perf tests: Decompress kernel module before objdump (bnc#1012382).
- perf tools: Fix copyfile_offset update of output offset (bnc#1012382).
- perf trace: Add mmap alias for s390 (bnc#1012382).
- pidns: disable pid allocation if pid_ns_prepare_proc() is failed in alloc_pid() (bnc#1012382).
- pNFS/flexfiles: missing error code in ff_layout_alloc_lseg() (bnc#1012382).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/[booke|4xx]: Do not clobber TCR[WP] when setting TCR[DIE] (bnc#1012382).
- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).
- powerpc: Do not send system reset request through the oops path (bsc#1088242).
- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).
- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).
- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).
- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).
- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).
- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). Update patches.suse/powerpc-pseries-rfi-flush-Call-setup_rfi_flush-after.patch (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/spufs: Fix coredump of SPU contexts (bnc#1012382).
- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).
- pptp: remove a buggy dst release in pptp_connect() (bnc#1012382).
- qlge: Avoid reading past end of buffer (bnc#1012382).
- r8152: add Linksys USB3GIGV1 id (bnc#1012382).
- r8169: fix setting driver_data after register_netdev (bnc#1012382).
- radeon: hide pointless #warning when compile testing (bnc#1012382).
- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).
- random: use lockless method of accessing and updating f->reg_idx (bnc#1012382).
- ray_cs: Avoid reading past end of buffer (bnc#1012382).
- rdma/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (FATE#321732).
- rdma/mlx5: Protect from NULL pointer derefence (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).
- rdma/qedr: fix QP's ack timeout configuration (bsc#1022604 FATE#321747).
- rdma/qedr: Fix QP state initialization race (bsc#1022604 FATE#321747).
- rdma/qedr: Fix rc initialization on CNQ allocation failure (bsc#1022604 FATE#321747).
- rdma/rxe: Fix an out-of-bounds read (FATE#322149).
- rdma/ucma: Check AF family prior resolving address (bnc#1012382).
- rdma/ucma: Check that device exists prior to accessing it (bnc#1012382).
- rdma/ucma: Check that device is connected prior to access it (bnc#1012382).
- rdma/ucma: Do not allow join attempts for unsupported AF family (bnc#1012382).
- rdma/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).
- rdma/ucma: Ensure that CM_ID exists prior to access it (bnc#1012382).
- rdma/ucma: Fix use-after-free access in ucma_close (bnc#1012382).
- rdma/ucma: Introduce safer rdma_addr_size() variants (bnc#1012382).
- rds; Reset rs->rs_bound_addr in rds_add_bound() failure path (bnc#1012382).
- regulator: gpio: Fix some error handling paths in 'gpio_regulator_probe()' (bsc#1091960).
- resource: fix integer overflow at reallocation (bnc#1012382).
- Revert 'alsa: pcm: Fix mutex unbalance in OSS emulation ioctls' (kabi).
- Revert 'alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams' (kabi).
- Revert 'arm: dts: am335x-pepper: Fix the audio CODEC's reset pin' (bnc#1012382).
- Revert 'arm: dts: omap3-n900: Fix the audio CODEC's reset pin' (bnc#1012382).
- Revert 'ath10k: send (re)assoc peer command when NSS changed' (bnc#1012382).
- Revert 'cpufreq: Fix governor module removal race' (bnc#1012382).
- Revert 'ip6_vti: adjust vti mtu according to mtu of lower device' (bnc#1012382).
- Revert 'KVM: Fix stack-out-of-bounds read in write_mmio' (bnc#1083635).
- Revert 'mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block.' (kabi).
- Revert 'mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug.' (kabi).
- Revert 'mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block.' (kabi).
- Revert 'mtip32xx: use runtime tag to initialize command header' (bnc#1012382).
- Revert 'PCI/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown()' (bnc#1012382).
- Revert 'perf tests: Decompress kernel module before objdump' (bnc#1012382).
- Revert 'xhci: plat: Register shutdown for xhci_plat' (bnc#1012382).
- rpc_pipefs: fix double-dput() (bnc#1012382).
- rpm/config.sh: build against SP3 in OBS as well.
- rpm/config.sh: ensure sorted patches.
- rtc: interface: Validate alarm-time before handling rollover (bnc#1012382).
- rtc: opal: Handle disabled TPO in opal_get_tpo_time() (bnc#1012382).
- rtc: snvs: fix an incorrect check of return value (bnc#1012382).
- rtl8187: Fix NULL pointer dereference in priv->conf_mutex (bnc#1012382).
- rxrpc: check return value of skb_to_sgvec always (bnc#1012382).
- s390: add automatic detection of the spectre defense (bnc#1012382).
- s390: add optimized array_index_mask_nospec (bnc#1012382).
- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).
- s390: add sysfs attributes for spectre (bnc#1012382).
- s390/alternative: use a copy of the facility bit mask (bnc#1012382).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).
- s390: correct module section names for expoline code revert (bnc#1012382).
- s390: correct nospec auto detection init order (bnc#1012382).
- s390/dasd: fix hanging safe offline (bnc#1012382).
- s390/dasd: fix IO error for newly defined devices (bnc#1093144, LTC#167398).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).
- s390: enable CPU alternatives unconditionally (bnc#1012382).
- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).
- s390: introduce execute-trampolines for branches (bnc#1012382).
- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).
- s390: move _text symbol to address higher than zero (bnc#1012382).
- s390/qdio: do not merge ERROR output buffers (bnc#1012382).
- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).
- s390/qeth: consolidate errno translation (bnc#1093144, LTC#167507).
- s390/qeth: fix MAC address update sequence (bnc#1093144, LTC#167609).
- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, LTC#167507).
- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).
- s390: report spectre mitigation via syslog (bnc#1012382).
- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).
- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).
- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).
- sched/numa: Use down_read_trylock() for the mmap_sem (bnc#1012382).
- scsi: bnx2fc: fix race condition in bnx2fc_get_host_stats() (bnc#1012382).
- scsi: libiscsi: Allow sd_shutdown on bad transport (bnc#1012382).
- scsi: libsas: initialize sas_phy status according to response of DISCOVER (bnc#1012382).
- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088865).
- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088865).
- scsi: lpfc: Correct target queue depth application changes (bsc#1088865).
- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088865).
- scsi: lpfc: Fix Abort request WQ selection (bsc#1088865).
- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088865).
- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088865).
- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088865).
- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088865).
- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088865).
- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088865).
- scsi: lpfc: Fix WQ/CQ creation for older asic's (bsc#1088865).
- scsi: lpfc: update driver version to 11.4.0.7-2 (bsc#1088865).
- scsi: mpt3sas: Proper handling of set/clear of 'ATA command pending' flag (bnc#1012382).
- scsi: mptsas: Disable WRITE SAME (bnc#1012382).
- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).
- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: do not leak kernel memory to user space (bnc#1012382).
- sctp: fix recursive locking warning in sctp_do_peeloff (bnc#1012382).
- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (bnc#1012382).
- selftests/powerpc: Fix TM resched DSCR test with some compilers (bnc#1012382).
- selinux: do not check open permission on sockets (bnc#1012382).
- selinux: Remove redundant check for unknown labeling behavior (bnc#1012382).
- selinux: Remove unnecessary check of array base in selinux_set_mapping() (bnc#1012382).
- serial: 8250: omap: Disable DMA for console UART (bnc#1012382).
- serial: mctrl_gpio: Add missing module license (bnc#1012382).
- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).
- serial: sh-sci: Fix race condition causing garbage during shutdown (bnc#1012382).
- sh_eth: Use platform device for printing before register_netdev() (bnc#1012382).
- sit: reload iphdr in ipip6_rcv (bnc#1012382).
- skbuff: only inherit relevant tx_flags (bnc#1012382).
- skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow (bnc#1012382).
- sky2: Increase D3 delay to sky2 stops working after suspend (bnc#1012382).
- slip: Check if rstate is initialized before uncompressing (bnc#1012382).
- sparc64: ldc abort during vds iso boot (bnc#1012382).
- spi: davinci: fix up dma_mapping_error() incorrect patch (bnc#1012382).
- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bnc#1012382).
- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).
- staging: wlan-ng: prism2mgmt.c: fixed a double endian conversion before calling hfa384x_drvr_setconfig16, also fixes relative sparse warning (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- tags: honor COMPILED_SOURCE with apart output directory (bnc#1012382).
- tcp: better validation of received ack sequences (bnc#1012382).
- tcp: do not read out-of-bounds opsize (bnc#1012382).
- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).
- team: avoid adding twice the same option to the event list (bnc#1012382).
- team: fix netconsole setup over team (bnc#1012382).
- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).
- thermal: power_allocator: fix one race condition issue for thermal_instances list (bnc#1012382).
- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).
- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).
- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).
- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).
- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bnc#1012382).
- tty: n_gsm: Fix DLCI handling for ADM mode if debug & 2 is not set (bnc#1012382).
- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).
- tty: provide tty_name() even without CONFIG_TTY (bnc#1012382).
- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).
- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).
- ubi: Fix error for write access (bnc#1012382).
- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).
- ubi: Reject MLC NAND (bnc#1012382).
- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).
- Update config files, add expoline for s390x (bsc#1089393).
- Update patches.suse/x86-nospectre_v2-means-nospec-too.patch (bsc#1075994 bsc#1075091 bnc#1085958).
- usb: chipidea: properly handle host or gadget initialization failure (bnc#1012382).
- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).
- usb: dwc2: Improve gadget state disconnection handling (bnc#1012382).
- usb: dwc3: keystone: check return value (bnc#1012382).
- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).
- usb: ene_usb6250: fix first command execution (bnc#1012382).
- usb: ene_usb6250: fix SCSI residue overwriting (bnc#1012382).
- usb:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).
- usb: gadget: align buffer size when allocating for OUT endpoint (bnc#1012382).
- usb: gadget: change len to size_t on alloc_ep_req() (bnc#1012382).
- usb: gadget: define free_ep_req as universal function (bnc#1012382).
- usb: gadget: f_hid: fix: Prevent accessing released memory (bnc#1012382).
- usb: gadget: fix request length error for isoc transfer (git-fixes).
- usb: gadget: fix usb_ep_align_maybe endianness and new usb_ep_align (bnc#1012382).
- usb: Increment wakeup count on remote wakeup (bnc#1012382).
- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).
- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).
- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).
- usb: serial: cp210x: add ELDAT Easywave RX09 id (bnc#1012382).
- usb: serial: cp210x: add ID for NI USB serial console (bnc#1012382).
- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bnc#1012382).
- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bnc#1012382).
- usb: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).
- usb: serial: simple: add libtransistor console (bnc#1012382).
- vfb: fix video mode and line_length being set when loaded (bnc#1012382).
- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).
- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).
- vfio-pci: Virtualize PCIe & AF FLR (bnc#1012382).
- vhost: correctly remove wait queue during poll failure (bnc#1012382).
- virtio: add ability to iterate over vqs (bnc#1012382).
- virtio_console: free buffers after reset (bnc#1012382).
- virtio_net: check return value of skb_to_sgvec always (bnc#1012382).
- virtio_net: check return value of skb_to_sgvec in one more location (bnc#1012382).
- vlan: also check phy_driver ts_info for vlan's real device (bnc#1012382).
- vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi (bnc#1012382).
- vmxnet3: ensure that adapter is in proper state during force_close (bnc#1012382).
- vrf: Fix use after free and double free in vrf_finish_output (bnc#1012382).
- vt: change SGR 21 to follow the standards (bnc#1012382).
- vti6: better validate user provided tunnel names (bnc#1012382).
- vxlan: dont migrate permanent fdb entries during learn (bnc#1012382).
- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).
- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).
- wl1251: check return from call to wl1251_acx_arp_ip_filter (bnc#1012382).
- writeback: fix the wrong congested state variable definition (bnc#1012382).
- writeback: safer lock nesting (bnc#1012382).
- x86/asm: Do not use RBP as a temporary register in csum_partial_copy_generic() (bnc#1012382).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).
- x86/hweight: Do not clobber %rdi (bnc#1012382).
- x86/hweight: Get rid of the special calling convention (bnc#1012382).
- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).
- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263 #fate#322814).
- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263
- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).
- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263 #fate#322814).
- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263 #fate#322814).
- x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case (bsc#1089925).
- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263 #fate#322814).
- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).
- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).
- x86/tsc: Provide 'tsc=unstable' boot parameter (bnc#1012382).
- xen: avoid type warning in xchg_xen_ulong (bnc#1012382).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xfrm: fix state migration copy replay sequence numbers (bnc#1012382).
- xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems (bnc#1012382).
- xfrm_user: uncoditionally validate esn replay attribute struct (bnc#1012382).
- xfs: always verify the log tail during recovery (bsc#1036215).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).
- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).
- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-955,SUSE-SLE-HA-12-SP3-2018-955,SUSE-SLE-Live-Patching-12-SP3-2018-955,SUSE-SLE-SDK-12-SP3-2018-955,SUSE-SLE-SERVER-12-SP3-2018-955,SUSE-SLE-WE-12-SP3-2018-955
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.131 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3639: Information leaks using \u0027Memory Disambiguation\u0027 feature\n in modern CPUs were mitigated, aka \u0027Spectre Variant 4\u0027 (bnc#1087082).\n\n A new boot commandline option was introduced,\n \u0027spec_store_bypass_disable\u0027, which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via\n prctl. Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as \u0027prctl\u0027 above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is \u0027seccomp\u0027, meaning programs need explicit opt-in into the mitigation.\n\n Status can be queried via the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - \u0027Vulnerable\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl\u0027\n - \u0027Mitigation: Speculative Store Bypass disabled via prctl and seccomp\u0027\n\n\n- CVE-2018-8781: The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c\n had an integer-overflow vulnerability allowing local users with access\n to the udldrmfb driver to obtain full read and write permissions on\n kernel physical pages, resulting in a code execution in kernel space\n (bnc#1090643).\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c\n might have allowed local users to cause a denial of service via an\n INT_MIN argument (bnc#1089752).\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might\n have allowed local users to cause a denial of service by triggering an\n attempted use of the -INT_MIN value (bnc#1089608).\n- CVE-2018-1000199: An address corruption flaw was discovered while\n modifying a h/w breakpoint via \u0027modify_user_hw_breakpoint\u0027 routine, an\n unprivileged user/process could use this flaw to crash the system kernel\n resulting in DoS OR to potentially escalate privileges on a the system. (bsc#1089895)\n- CVE-2018-1130: The Linux kernel was vulnerable to a null pointer\n dereference in dccp_write_xmit() function in net/dccp/output.c in that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bnc#1092904).\n- CVE-2018-5803: An error in the _sctp_make_chunk() function when handling\n SCTP, packet length could have been exploited by a malicious local user\n to cause a kernel crash and a DoS. (bnc#1083900).\n- CVE-2018-1065: The netfilter subsystem mishandled the case of\n a rule blob that contains a jump but lacks a user-defined chain,\n which allowed local users to cause a denial of service (NULL\n pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN\n capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c,\n ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in\n net/ipv6/netfilter/ip6_tables.c (bnc#1083650 1091925).\n- CVE-2018-7492: A NULL pointer dereference was found in the\n net/rds/rdma.c __rds_rdma_map() function allowing local attackers to\n cause a system panic and a denial-of-service, related to RDS_GET_MR and\n RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- acpica: Disassembler: Abort on an invalid/unknown AML opcode (bnc#1012382).\n- acpica: Events: Add runtime stub support for event APIs (bnc#1012382).\n- acpi / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).\n- acpi, PCI, irq: remove redundant check for null string pointer (bnc#1012382).\n- acpi / scan: Send change uevent with offine environmental data (bsc#1082485).\n- acpi / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).\n- alsa: asihpi: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: control: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).\n- alsa: hda: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: hda - New VIA controller suppor no-snoop path (bnc#1012382).\n- alsa: hda/realtek - Add some fixes for ALC233 (bnc#1012382).\n- alsa: hdspm: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: line6: Use correct endpoint type for midi output (bnc#1012382).\n- alsa: opl3: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).\n- alsa: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).\n- alsa: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).\n- alsa: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).\n- alsa: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).\n- alsa: pcm: potential uninitialized return values (bnc#1012382).\n- alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).\n- alsa: pcm: Use dma_bytes as size parameter in dma_mmap_coherent() (bnc#1012382).\n- alsa: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).\n- alsa: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).\n- alsa: rme9652: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).\n- alsa: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).\n- alsa: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- arm64: avoid overflow in VA_START and PAGE_OFFSET (bnc#1012382).\n- arm64: futex: Fix undefined behaviour with FUTEX_OP_OPARG_SHIFT usage (bnc#1012382).\n- arm: amba: Do not read past the end of sysfs \u0027driver_override\u0027 buffer (bnc#1012382).\n- arm: amba: Fix race condition with driver_override (bnc#1012382).\n- arm: amba: Make driver_override output consistent with other buses (bnc#1012382).\n- arm: davinci: da8xx: Create DSP device only when assigned memory (bnc#1012382).\n- arm: dts: am57xx-beagle-x15-common: Add overide powerhold property (bnc#1012382).\n- arm: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).\n- arm: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).\n- arm: dts: dra7: Add power hold and power controller properties to palmas (bnc#1012382).\n- arm: dts: imx53-qsrb: Pulldown PMIC IRQ pin (bnc#1012382).\n- arm: dts: imx6qdl-wandboard: Fix audio channel swap (bnc#1012382).\n- arm: dts: ls1021a: add \u0027fsl,ls1021a-esdhc\u0027 compatible string to esdhc node (bnc#1012382).\n- arm: imx: Add MXC_CPU_IMX6ULL and cpu_is_imx6ull (bnc#1012382).\n- arp: fix arp_filter on l3slave devices (bnc#1012382).\n- arp: honour gratuitous ARP _replies_ (bnc#1012382).\n- asoc: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).\n- asoc: Intel: cht_bsw_rt5645: Analog Mic support (bnc#1012382).\n- asoc: rsnd: SSI PIO adjust to 24bit mode (bnc#1012382).\n- asoc: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).\n- async_tx: Fix DMA_PREP_FENCE usage in do_async_gen_syndrome() (bnc#1012382).\n- ata: libahci: properly propagate return value of platform_get_irq() (bnc#1012382).\n- ath5k: fix memory leak on buf on failed eeprom read (bnc#1012382).\n- ath9k_hw: check if the chip failed to wake up (bnc#1012382).\n- audit: add tty field to LOGIN event (bnc#1012382).\n- autofs: mount point create should honour passed in mode (bnc#1012382).\n- bcache: segregate flash only volume write streams (bnc#1012382).\n- bcache: stop writeback thread after detaching (bnc#1012382).\n- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)\n- blk-mq: fix bad clear of RQF_MQ_INFLIGHT in blk_mq_ct_ctx_init() (bsc#1085058).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bnc#1012382).\n- block: correctly mask out flags in blk_rq_append_bio() (bsc#1085058).\n- block/loop: fix deadlock after loop_set_status (bnc#1012382).\n- block: sanity check for integrity intervals (bsc#1091728).\n- bluetooth: Fix missing encryption refresh on Security Request (bnc#1012382).\n- bluetooth: Send HCI Set Event Mask Page 2 command only when needed (bnc#1012382).\n- bna: Avoid reading past end of buffer (bnc#1012382).\n- bnx2x: Allow vfs to disable txvlan offload (bnc#1012382).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).\n- bonding: Do not update slave-\u003elink until ready to commit (bnc#1012382).\n- bonding: fix the err path for dev hwaddr sync in bond_enslave (bnc#1012382).\n- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (bnc#1012382).\n- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (bnc#1012382).\n- btrfs: fix incorrect error return ret being passed to mapping_set_error (bnc#1012382).\n- btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).\n- btrfs: Only check first key for committed tree blocks (bsc#1084721).\n- btrfs: Validate child tree block\u0027s level and first key (bsc#1084721).\n- bus: brcmstb_gisb: correct support for 64-bit address output (bnc#1012382).\n- bus: brcmstb_gisb: Use register offsets with writes too (bnc#1012382).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (fate#324665 bsc#1089115).\n- ceph: do not check quota for snap inode (fate#324665 bsc#1089115).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix root quota realm check (fate#324665 bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: quota: add counter for snaprealms with quota (fate#324665 bsc#1089115).\n- ceph: quota: add initial infrastructure to support cephfs quotas (fate#324665 bsc#1089115).\n- ceph: quota: cache inode pointer in ceph_snap_realm (fate#324665 bsc#1089115).\n- ceph: quota: do not allow cross-quota renames (fate#324665 bsc#1089115).\n- ceph: quota: report root dir quota usage in statfs (fate#324665 bsc#1089115).\n- ceph: quota: support for ceph.quota.max_bytes (fate#324665 bsc#1089115).\n- ceph: quota: support for ceph.quota.max_files (fate#324665 bsc#1089115).\n- ceph: quota: update MDS when max_bytes is approaching (fate#324665 bsc#1089115).\n- cfg80211: make RATE_INFO_BW_20 the default (bnc#1012382).\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- cifs: silence lockdep splat in cifs_relock_file() (bnc#1012382).\n- cifs: Use file_dentry() (bsc#1093008).\n- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).\n- clk: Fix __set_clk_rates error print-string (bnc#1012382).\n- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).\n- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).\n- clk: scpi: fix return type of __scpi_dvfs_round_rate (bnc#1012382).\n- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).\n- cpumask: Add helper cpumask_available() (bnc#1012382).\n- crypto: ahash - Fix early termination in hash walk (bnc#1012382).\n- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bnc#1012382).\n- cx25840: fix unchecked return values (bnc#1012382).\n- cxgb4: fix incorrect cim_la output for T6 (bnc#1012382).\n- cxgb4: Fix queue free path of ULD drivers (bsc#1022743 FATE#322540).\n- cxgb4: FW upgrade fixes (bnc#1012382).\n- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bnc#1012382).\n- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).\n- dmaengine: imx-sdma: Handle return value of clk_prepare_enable (bnc#1012382).\n- dm ioctl: remove double parentheses (bnc#1012382).\n- Documentation: pinctrl: palmas: Add ti,palmas-powerhold-override property definition (bnc#1012382).\n- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).\n- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (FATE#321732).\n- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bnc#1024296,FATE#321265).\n- drivers/misc/vmw_vmci/vmci_queue_pair.c: fix a couple integer overflow tests (bnc#1012382).\n- drm/omap: fix tiled buffer stride calculations (bnc#1012382).\n- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).\n- drm/virtio: fix vq wait_event condition (bnc#1012382).\n- e1000e: fix race condition around skb_tstamp_tx() (bnc#1012382).\n- e1000e: Undo e1000e_pm_freeze if __e1000_shutdown fails (bnc#1012382).\n- edac, mv64x60: Fix an error handling path (bnc#1012382).\n- Enable uinput driver (bsc#1092566).\n- esp: Fix memleaks on error paths (git-fixes).\n- ext4: add validity checks for bitmap block numbers (bnc#1012382).\n- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).\n- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).\n- ext4: fix bitmap position validation (bnc#1012382).\n- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).\n- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: fix off-by-one on max nr_pages in ext4_find_unwritten_pgoff() (bnc#1012382).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).\n- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).\n- fanotify: fix logic of events on child (bnc#1012382).\n- fix race in drivers/char/random.c:get_reg() (bnc#1012382).\n- frv: declare jiffies to be located in the .data section (bnc#1012382).\n- fs: compat: Remove warning from COMPATIBLE_IOCTL (bnc#1012382).\n- fs/proc: Stop trying to report thread stacks (bnc#1012382).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).\n- genirq: Use cpumask_available() for check of cpumask variable (bnc#1012382).\n- getname_kernel() needs to make sure that -\u003ename != -\u003einame in long case (bnc#1012382).\n- gpio: label descriptors using the device name (bnc#1012382).\n- hdlcdrv: Fix divide by zero in hdlcdrv_ioctl (bnc#1012382).\n- hid: core: Fix size as type u32 (bnc#1012382).\n- hid: Fix hid_report_len usage (bnc#1012382).\n- hid: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).\n- hid: i2c-hid: fix size check and type usage (bnc#1012382).\n- hwmon: (ina2xx) Fix access to uninitialized mutex (git-fixes).\n- hwmon: (ina2xx) Make calibration register value fixed (bnc#1012382).\n- hypfs_kill_super(): deal with failed allocations (bnc#1012382).\n- i40iw: Free IEQ resources (bsc#969476 FATE#319648 bsc#969477 FATE#319816).\n- ib/core: Fix possible crash to access NULL netdev (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/core: Generate GID change event regardless of RoCE GID table property (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/mlx4: Fix corruption of RoCEv2 IPv4 GIDs (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/mlx4: Include GID type when deleting GIDs from HW table under RoCE (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- ib/mlx5: Avoid passing an invalid QP type to firmware (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ib/mlx5: Fix an error code in __mlx5_ib_modify_qp() (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- ib/mlx5: Fix incorrect size of klms in the memory region (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- ib/mlx5: Fix out-of-bounds read in create_raw_packet_qp_rq (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- ib/mlx5: revisit -Wmaybe-uninitialized warning (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ib/mlx5: Set the default active rate and width to QDR and 4X (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).\n- ibmvnic: Clear pending interrupt after device reset (bsc#1089644).\n- ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198).\n- ibmvnic: Do not notify peers on parameter change resets (bsc#1089198).\n- ibmvnic: Handle all login error conditions (bsc#1089198).\n- ib/srp: Fix completion vector assignment algorithm (bnc#1012382).\n- ib/srp: Fix srp_abort() (bnc#1012382).\n- ib/srpt: Fix abort handling (bnc#1012382).\n- ib/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bnc#1024296,FATE#321265).\n- iio: hi8435: avoid garbage event at first enable (bnc#1012382).\n- iio: hi8435: cleanup reset gpio (bnc#1012382).\n- iio: magnetometer: st_magn_spi: fix spi_device_id table (bnc#1012382).\n- input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).\n- input: ALPS - fix trackstick button handling on V8 devices (git-fixes).\n- input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).\n- input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).\n- input: drv260x - fix initializing overdrive voltage (bnc#1012382).\n- input: elan_i2c - check if device is there before really probing (bnc#1012382).\n- input: elan_i2c - clear INT before resetting controller (bnc#1012382).\n- input: elantech - force relative mode on a certain module (bnc#1012382).\n- input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bnc#1012382).\n- input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bnc#1012382).\n- input: mousedev - fix implicit conversion warning (bnc#1012382).\n- iommu/vt-d: Fix a potential memory leak (bnc#1012382).\n- ip6_gre: better validate user provided tunnel names (bnc#1012382).\n- ip6_tunnel: better validate user provided tunnel names (bnc#1012382).\n- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).\n- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799). Refresh patch to mainline version.\n- ipsec: check return value of skb_to_sgvec always (bnc#1012382).\n- ip_tunnel: better validate user provided tunnel names (bnc#1012382).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).\n- ipv6: avoid dad-failures for addresses with NODAD (bnc#1012382).\n- ipv6: sit: better validate user provided tunnel names (bnc#1012382).\n- ipv6: the entire IPv6 header chain must fit the first fragment (bnc#1012382).\n- iw_cxgb4: print mapped ports correctly (bsc#321658 FATE#1005778 bsc#321660 FATE#1005780 bsc#321661 FATE#1005781).\n- jbd2: fix use after free in kjournald2() (bnc#1012382).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).\n- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).\n- jiffies.h: declare jiffies and jiffies_64 with ____cacheline_aligned_in_smp (bnc#1012382).\n- kABI: add tty include to audit.c (kabi).\n- kABI: protect hid report functions (kabi).\n- kABI: protect jiffies types (kabi).\n- kABI: protect skb_to_sgvec* (kabi).\n- kABI: protect sound/timer.h include in sound pcm.c (kabi).\n- kABI: protect struct cstate (kabi).\n- kABI: protect struct _lowcore (kabi).\n- kABI: protect tty include in audit.h (kabi).\n- kabi/severities: Ignore kgr_shadow_* kABI changes\n- kbuild: provide a __UNIQUE_ID for clang (bnc#1012382).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).\n- keys: DNS: limit the length of option strings (bnc#1012382).\n- kGraft: fix small race in reversion code (bsc#1083125).\n- kobject: do not use WARN for registration failures (bnc#1012382).\n- kvm: Fix nopvspin static branch init usage (bsc#1056427).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: nVMX: Fix handling of lmsw instruction (bnc#1012382).\n- kvm: PPC: Book3S PR: Check copy_to/from_user return values (bnc#1012382).\n- kvm: SVM: do not zero out segment attributes if segment is unusable or not present (bnc#1012382).\n- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).\n- l2tp: fix missing print session offset info (bnc#1012382).\n- lan78xx: Correctly indicate invalid OTP (bnc#1012382).\n- leds: pca955x: Correct I2C Functionality (bnc#1012382).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299 fate#313296).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299 fate#313296).\n- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).\n- llc: hold llc_sap before release_sock() (bnc#1012382).\n- llist: clang: introduce member_address_is_nonnull() (bnc#1012382).\n- lockd: fix lockd shutdown race (bnc#1012382).\n- lockd: lost rollback of set_grace_period() in lockd_down_net() (git-fixes).\n- mac80211: bail out from prep_connection() if a reconfig is ongoing (bnc#1012382).\n- mceusb: sporadic RX truncation corruption fix (bnc#1012382).\n- md: document lifetime of internal rdev pointer (bsc#1056415).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1089023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).\n- md raid10: fix NULL deference in handle_write_completed() (git-fixes).\n- md/raid10: reset the \u0027first\u0027 at the end of loop (bnc#1012382).\n- md/raid5: make use of spin_lock_irq over local_irq_disable + spin_lock (bnc#1012382).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).\n- media: videobuf2-core: do not go out of the buffer range (bnc#1012382).\n- mei: remove dev_err message on an unsupported ioctl (bnc#1012382).\n- mISDN: Fix a sleep-in-atomic bug (bnc#1012382).\n- mlx5: fix bug reading rss_hash_type from CQE (bnc#1012382).\n- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).\n- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).\n- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).\n- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).\n- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).\n- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bnc#1012382).\n- neighbour: update neigh timestamps iff update is effective (bnc#1012382).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).\n- net: cavium: liquidio: fix up \u0027Avoid dma_unmap_single on uninitialized ndata\u0027 (bnc#1012382).\n- net: cdc_ncm: Fix TX zero padding (bnc#1012382).\n- net: emac: fix reset timeout with AR8035 phy (bnc#1012382).\n- net: ethernet: ti: cpsw: adjust cpsw fifos depth for fullduplex flow control (bnc#1012382).\n- netfilter: bridge: ebt_among: add more missing match size checks (bnc#1012382).\n- netfilter: ctnetlink: fix incorrect nf_ct_put during hash resize (bnc#1012382).\n- netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch (bnc#1012382).\n- netfilter: nf_nat_h323: fix logical-not-parentheses warning (bnc#1012382).\n- netfilter: x_tables: add and use xt_check_proc_name (bnc#1012382).\n- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).\n- net: fix possible out-of-bound read in skb_network_protocol() (bnc#1012382).\n- net: fool proof dev_valid_name() (bnc#1012382).\n- net: freescale: fix potential null pointer dereference (bnc#1012382).\n- net: hns: Fix ethtool private flags (bnc#1012382 bsc#1085511).\n- net: ieee802154: fix net_device reference release too early (bnc#1012382).\n- net/ipv6: Fix route leaking between VRFs (bnc#1012382).\n- net/ipv6: Increment OUTxxx counters after netfilter hook (bnc#1012382).\n- netlink: make sure nladdr has correct size in netlink_connect() (bnc#1012382).\n- net: llc: add lock_sock in llc_ui_bind to avoid a race condition (bnc#1012382).\n- net/mlx4: Check if Granular QoS per VF has been enabled before updating QP qos_vport (bnc#1012382).\n- net/mlx4_core: Fix memory leak while delete slave\u0027s resources (bsc#966191 FATE#320230 bsc#966186 FATE#320228).\n- net/mlx4_en: Avoid adding steering rules with invalid ring (bnc#1012382).\n- net/mlx4_en: Fix mixed PFC and Global pause user control requests (bsc#1015336 FATE#321685 bsc#1015337 FATE#321686 bsc#1015340 FATE#321687).\n- net/mlx4: Fix the check in attaching steering rules (bnc#1012382).\n- net/mlx5: avoid build warning for uniprocessor (bnc#1012382).\n- net/mlx5e: Add error print in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: Check support before TC swap in ETS init (bsc#966170 FATE#320225 bsc#966172 FATE#320226).\n- net/mlx5e: E-Switch, Use the name of static array instead of its address (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Fix error handling in load one (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Fix ingress/egress naming mistake (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- net/mlx5: Tolerate irq_set_affinity_hint() failures (bnc#1012382).\n- net: move somaxconn init from sysctl code (bnc#1012382).\n- net: phy: avoid genphy_aneg_done() for PHYs without clause 22 support (bnc#1012382).\n- net: qca_spi: Fix alignment issues in rx path (bnc#1012382).\n- net sched actions: fix dumping which requires several messages to user space (bnc#1012382).\n- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bnc#1012382).\n- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).\n- net: x25: fix one potential use-after-free issue (bnc#1012382).\n- net: xfrm: use preempt-safe this_cpu_read() in ipcomp_alloc_tfms() (bnc#1012382).\n- nfsv4.1: RECLAIM_COMPLETE must handle NFS4ERR_CONN_NOT_BOUND_TO_SESSION (bnc#1012382).\n- nfsv4.1: Work around a Linux server bug.. (bnc#1012382).\n- nospec: Kill array_index_nospec_mask_check() (bnc#1012382).\n- nospec: Move array_index_nospec() parameter checking into separate macro (bnc#1012382).\n- ovl: filter trusted xattr for non-admin (bnc#1012382).\n- packet: fix bitfield update race (bnc#1012382).\n- parisc: Fix out of array access in match_pci_device() (bnc#1012382).\n- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bnc#1012382).\n- partitions/msdos: Unable to mount UFS 44bsd partitions (bnc#1012382).\n- pci/cxgb4: Extend T3 PCI quirk to T4+ devices (bsc#981348).\n- pci: Make PCI_ROM_ADDRESS_MASK a 32-bit constant (bnc#1012382).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1012382).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf header: Set proper module name when build-id event found (bnc#1012382).\n- perf/hwbp: Simplify the perf-hwbp code, fix documentation (bnc#1012382).\n- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).\n- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).\n- perf intel-pt: Fix sync_switch (bnc#1012382).\n- perf intel-pt: Fix timestamp following overflow (bnc#1012382).\n- perf probe: Add warning message if there is unexpected event name (bnc#1012382).\n- perf report: Ensure the perf DSO mapping matches what libdw sees (bnc#1012382).\n- perf: Return proper values for user stack errors (bnc#1012382).\n- perf tests: Decompress kernel module before objdump (bnc#1012382).\n- perf tools: Fix copyfile_offset update of output offset (bnc#1012382).\n- perf trace: Add mmap alias for s390 (bnc#1012382).\n- pidns: disable pid allocation if pid_ns_prepare_proc() is failed in alloc_pid() (bnc#1012382).\n- pNFS/flexfiles: missing error code in ff_layout_alloc_lseg() (bnc#1012382).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/[booke|4xx]: Do not clobber TCR[WP] when setting TCR[DIE] (bnc#1012382).\n- powerpc/crash: Remove the test for cpu_online in the IPI callback (bsc#1088242).\n- powerpc: Do not send system reset request through the oops path (bsc#1088242).\n- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).\n- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).\n- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).\n- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).\n- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).\n- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).\n- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). Update patches.suse/powerpc-pseries-rfi-flush-Call-setup_rfi_flush-after.patch (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/spufs: Fix coredump of SPU contexts (bnc#1012382).\n- powerpc: System reset avoid interleaving oops using die synchronisation (bsc#1088242).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).\n- pptp: remove a buggy dst release in pptp_connect() (bnc#1012382).\n- qlge: Avoid reading past end of buffer (bnc#1012382).\n- r8152: add Linksys USB3GIGV1 id (bnc#1012382).\n- r8169: fix setting driver_data after register_netdev (bnc#1012382).\n- radeon: hide pointless #warning when compile testing (bnc#1012382).\n- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).\n- random: use lockless method of accessing and updating f-\u003ereg_idx (bnc#1012382).\n- ray_cs: Avoid reading past end of buffer (bnc#1012382).\n- rdma/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (FATE#321732).\n- rdma/mlx5: Protect from NULL pointer derefence (bsc#1015342 FATE#321688 bsc#1015343 FATE#321689).\n- rdma/qedr: fix QP\u0027s ack timeout configuration (bsc#1022604 FATE#321747).\n- rdma/qedr: Fix QP state initialization race (bsc#1022604 FATE#321747).\n- rdma/qedr: Fix rc initialization on CNQ allocation failure (bsc#1022604 FATE#321747).\n- rdma/rxe: Fix an out-of-bounds read (FATE#322149).\n- rdma/ucma: Check AF family prior resolving address (bnc#1012382).\n- rdma/ucma: Check that device exists prior to accessing it (bnc#1012382).\n- rdma/ucma: Check that device is connected prior to access it (bnc#1012382).\n- rdma/ucma: Do not allow join attempts for unsupported AF family (bnc#1012382).\n- rdma/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).\n- rdma/ucma: Ensure that CM_ID exists prior to access it (bnc#1012382).\n- rdma/ucma: Fix use-after-free access in ucma_close (bnc#1012382).\n- rdma/ucma: Introduce safer rdma_addr_size() variants (bnc#1012382).\n- rds; Reset rs-\u003ers_bound_addr in rds_add_bound() failure path (bnc#1012382).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- resource: fix integer overflow at reallocation (bnc#1012382).\n- Revert \u0027alsa: pcm: Fix mutex unbalance in OSS emulation ioctls\u0027 (kabi).\n- Revert \u0027alsa: pcm: Return -EBUSY for OSS ioctls changing busy streams\u0027 (kabi).\n- Revert \u0027arm: dts: am335x-pepper: Fix the audio CODEC\u0027s reset pin\u0027 (bnc#1012382).\n- Revert \u0027arm: dts: omap3-n900: Fix the audio CODEC\u0027s reset pin\u0027 (bnc#1012382).\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bnc#1012382).\n- Revert \u0027cpufreq: Fix governor module removal race\u0027 (bnc#1012382).\n- Revert \u0027ip6_vti: adjust vti mtu according to mtu of lower device\u0027 (bnc#1012382).\n- Revert \u0027KVM: Fix stack-out-of-bounds read in write_mmio\u0027 (bnc#1083635).\n- Revert \u0027mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block.\u0027 (kabi).\n- Revert \u0027mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug.\u0027 (kabi).\n- Revert \u0027mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block.\u0027 (kabi).\n- Revert \u0027mtip32xx: use runtime tag to initialize command header\u0027 (bnc#1012382).\n- Revert \u0027PCI/MSI: Stop disabling MSI/MSI-X in pci_device_shutdown()\u0027 (bnc#1012382).\n- Revert \u0027perf tests: Decompress kernel module before objdump\u0027 (bnc#1012382).\n- Revert \u0027xhci: plat: Register shutdown for xhci_plat\u0027 (bnc#1012382).\n- rpc_pipefs: fix double-dput() (bnc#1012382).\n- rpm/config.sh: build against SP3 in OBS as well.\n- rpm/config.sh: ensure sorted patches.\n- rtc: interface: Validate alarm-time before handling rollover (bnc#1012382).\n- rtc: opal: Handle disabled TPO in opal_get_tpo_time() (bnc#1012382).\n- rtc: snvs: fix an incorrect check of return value (bnc#1012382).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bnc#1012382).\n- rxrpc: check return value of skb_to_sgvec always (bnc#1012382).\n- s390: add automatic detection of the spectre defense (bnc#1012382).\n- s390: add optimized array_index_mask_nospec (bnc#1012382).\n- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).\n- s390: add sysfs attributes for spectre (bnc#1012382).\n- s390/alternative: use a copy of the facility bit mask (bnc#1012382).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).\n- s390: correct module section names for expoline code revert (bnc#1012382).\n- s390: correct nospec auto detection init order (bnc#1012382).\n- s390/dasd: fix hanging safe offline (bnc#1012382).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093144, LTC#167398).\n- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).\n- s390: enable CPU alternatives unconditionally (bnc#1012382).\n- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).\n- s390: introduce execute-trampolines for branches (bnc#1012382).\n- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).\n- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).\n- s390: move _text symbol to address higher than zero (bnc#1012382).\n- s390/qdio: do not merge ERROR output buffers (bnc#1012382).\n- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).\n- s390/qeth: consolidate errno translation (bnc#1093144, LTC#167507).\n- s390/qeth: fix MAC address update sequence (bnc#1093144, LTC#167609).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, LTC#167507).\n- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).\n- s390: report spectre mitigation via syslog (bnc#1012382).\n- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).\n- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).\n- sched/numa: Use down_read_trylock() for the mmap_sem (bnc#1012382).\n- scsi: bnx2fc: fix race condition in bnx2fc_get_host_stats() (bnc#1012382).\n- scsi: libiscsi: Allow sd_shutdown on bad transport (bnc#1012382).\n- scsi: libsas: initialize sas_phy status according to response of DISCOVER (bnc#1012382).\n- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088865).\n- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088865).\n- scsi: lpfc: Correct target queue depth application changes (bsc#1088865).\n- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088865).\n- scsi: lpfc: Fix Abort request WQ selection (bsc#1088865).\n- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088865).\n- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088865).\n- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088865).\n- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088865).\n- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088865).\n- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088865).\n- scsi: lpfc: Fix WQ/CQ creation for older asic\u0027s (bsc#1088865).\n- scsi: lpfc: update driver version to 11.4.0.7-2 (bsc#1088865).\n- scsi: mpt3sas: Proper handling of set/clear of \u0027ATA command pending\u0027 flag (bnc#1012382).\n- scsi: mptsas: Disable WRITE SAME (bnc#1012382).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).\n- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: do not leak kernel memory to user space (bnc#1012382).\n- sctp: fix recursive locking warning in sctp_do_peeloff (bnc#1012382).\n- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (bnc#1012382).\n- selftests/powerpc: Fix TM resched DSCR test with some compilers (bnc#1012382).\n- selinux: do not check open permission on sockets (bnc#1012382).\n- selinux: Remove redundant check for unknown labeling behavior (bnc#1012382).\n- selinux: Remove unnecessary check of array base in selinux_set_mapping() (bnc#1012382).\n- serial: 8250: omap: Disable DMA for console UART (bnc#1012382).\n- serial: mctrl_gpio: Add missing module license (bnc#1012382).\n- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).\n- serial: sh-sci: Fix race condition causing garbage during shutdown (bnc#1012382).\n- sh_eth: Use platform device for printing before register_netdev() (bnc#1012382).\n- sit: reload iphdr in ipip6_rcv (bnc#1012382).\n- skbuff: only inherit relevant tx_flags (bnc#1012382).\n- skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow (bnc#1012382).\n- sky2: Increase D3 delay to sky2 stops working after suspend (bnc#1012382).\n- slip: Check if rstate is initialized before uncompressing (bnc#1012382).\n- sparc64: ldc abort during vds iso boot (bnc#1012382).\n- spi: davinci: fix up dma_mapping_error() incorrect patch (bnc#1012382).\n- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bnc#1012382).\n- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).\n- staging: wlan-ng: prism2mgmt.c: fixed a double endian conversion before calling hfa384x_drvr_setconfig16, also fixes relative sparse warning (bnc#1012382).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- tags: honor COMPILED_SOURCE with apart output directory (bnc#1012382).\n- tcp: better validation of received ack sequences (bnc#1012382).\n- tcp: do not read out-of-bounds opsize (bnc#1012382).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).\n- team: avoid adding twice the same option to the event list (bnc#1012382).\n- team: fix netconsole setup over team (bnc#1012382).\n- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).\n- thermal: power_allocator: fix one race condition issue for thermal_instances list (bnc#1012382).\n- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).\n- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).\n- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).\n- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).\n- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bnc#1012382).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug \u0026 2 is not set (bnc#1012382).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).\n- tty: provide tty_name() even without CONFIG_TTY (bnc#1012382).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).\n- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).\n- ubi: Fix error for write access (bnc#1012382).\n- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).\n- ubi: Reject MLC NAND (bnc#1012382).\n- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).\n- Update config files, add expoline for s390x (bsc#1089393).\n- Update patches.suse/x86-nospectre_v2-means-nospec-too.patch (bsc#1075994 bsc#1075091 bnc#1085958).\n- usb: chipidea: properly handle host or gadget initialization failure (bnc#1012382).\n- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).\n- usb: dwc2: Improve gadget state disconnection handling (bnc#1012382).\n- usb: dwc3: keystone: check return value (bnc#1012382).\n- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).\n- usb: ene_usb6250: fix first command execution (bnc#1012382).\n- usb: ene_usb6250: fix SCSI residue overwriting (bnc#1012382).\n- usb:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).\n- usb: gadget: align buffer size when allocating for OUT endpoint (bnc#1012382).\n- usb: gadget: change len to size_t on alloc_ep_req() (bnc#1012382).\n- usb: gadget: define free_ep_req as universal function (bnc#1012382).\n- usb: gadget: f_hid: fix: Prevent accessing released memory (bnc#1012382).\n- usb: gadget: fix request length error for isoc transfer (git-fixes).\n- usb: gadget: fix usb_ep_align_maybe endianness and new usb_ep_align (bnc#1012382).\n- usb: Increment wakeup count on remote wakeup (bnc#1012382).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).\n- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).\n- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).\n- usb: serial: cp210x: add ELDAT Easywave RX09 id (bnc#1012382).\n- usb: serial: cp210x: add ID for NI USB serial console (bnc#1012382).\n- usb: serial: ftdi_sio: add RT Systems VX-8 cable (bnc#1012382).\n- usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bnc#1012382).\n- usb: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).\n- usb: serial: simple: add libtransistor console (bnc#1012382).\n- vfb: fix video mode and line_length being set when loaded (bnc#1012382).\n- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).\n- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).\n- vfio-pci: Virtualize PCIe \u0026 AF FLR (bnc#1012382).\n- vhost: correctly remove wait queue during poll failure (bnc#1012382).\n- virtio: add ability to iterate over vqs (bnc#1012382).\n- virtio_console: free buffers after reset (bnc#1012382).\n- virtio_net: check return value of skb_to_sgvec always (bnc#1012382).\n- virtio_net: check return value of skb_to_sgvec in one more location (bnc#1012382).\n- vlan: also check phy_driver ts_info for vlan\u0027s real device (bnc#1012382).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (bnc#1012382).\n- vmxnet3: ensure that adapter is in proper state during force_close (bnc#1012382).\n- vrf: Fix use after free and double free in vrf_finish_output (bnc#1012382).\n- vt: change SGR 21 to follow the standards (bnc#1012382).\n- vti6: better validate user provided tunnel names (bnc#1012382).\n- vxlan: dont migrate permanent fdb entries during learn (bnc#1012382).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).\n- watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\n- wl1251: check return from call to wl1251_acx_arp_ip_filter (bnc#1012382).\n- writeback: fix the wrong congested state variable definition (bnc#1012382).\n- writeback: safer lock nesting (bnc#1012382).\n- x86/asm: Do not use RBP as a temporary register in csum_partial_copy_generic() (bnc#1012382).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).\n- x86/hweight: Do not clobber %rdi (bnc#1012382).\n- x86/hweight: Get rid of the special calling convention (bnc#1012382).\n- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).\n- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263 #fate#322814).\n- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263\n- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).\n- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263 #fate#322814).\n- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263 #fate#322814).\n- x86/platform/uv: Skip UV runtime services mapping in the efi_runtime_disabled case (bsc#1089925).\n- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263 #fate#322814).\n- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).\n- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).\n- x86/tsc: Provide \u0027tsc=unstable\u0027 boot parameter (bnc#1012382).\n- xen: avoid type warning in xchg_xen_ulong (bnc#1012382).\n- xen-netfront: Fix hang on device removal (bnc#1012382).\n- xfrm: fix state migration copy replay sequence numbers (bnc#1012382).\n- xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systems (bnc#1012382).\n- xfrm_user: uncoditionally validate esn replay attribute struct (bnc#1012382).\n- xfs: always verify the log tail during recovery (bsc#1036215).\n- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).\n- xfs: detect and trim torn writes during log recovery (bsc#1036215).\n- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).\n- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).\n- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).\n- xfs: refactor and open code log record crc check (bsc#1036215).\n- xfs: refactor log record start detection into a new helper (bsc#1036215).\n- xfs: return start block of first bad log record during recovery (bsc#1036215).\n- xfs: support a crc verification only log record pass (bsc#1036215).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-955,SUSE-SLE-HA-12-SP3-2018-955,SUSE-SLE-Live-Patching-12-SP3-2018-955,SUSE-SLE-SDK-12-SP3-2018-955,SUSE-SLE-SERVER-12-SP3-2018-955,SUSE-SLE-WE-12-SP3-2018-955", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1366-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1366-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1366-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-May/004070.html" }, { "category": "self", "summary": "SUSE Bug 1005778", "url": "https://bugzilla.suse.com/1005778" }, { "category": "self", "summary": "SUSE Bug 1005780", "url": "https://bugzilla.suse.com/1005780" }, { "category": "self", "summary": "SUSE Bug 1005781", "url": "https://bugzilla.suse.com/1005781" }, { "category": "self", "summary": "SUSE Bug 1009062", "url": "https://bugzilla.suse.com/1009062" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1015336", "url": "https://bugzilla.suse.com/1015336" }, { "category": "self", "summary": "SUSE Bug 1015337", "url": "https://bugzilla.suse.com/1015337" }, { "category": "self", "summary": "SUSE Bug 1015340", "url": "https://bugzilla.suse.com/1015340" }, { "category": "self", "summary": "SUSE Bug 1015342", "url": "https://bugzilla.suse.com/1015342" }, { "category": "self", "summary": "SUSE Bug 1015343", "url": "https://bugzilla.suse.com/1015343" }, { "category": "self", "summary": "SUSE Bug 1022604", "url": "https://bugzilla.suse.com/1022604" }, { "category": "self", "summary": "SUSE Bug 1022743", "url": "https://bugzilla.suse.com/1022743" }, { "category": "self", "summary": "SUSE Bug 1024296", "url": "https://bugzilla.suse.com/1024296" }, { "category": "self", "summary": "SUSE Bug 1031492", "url": "https://bugzilla.suse.com/1031492" }, { "category": "self", "summary": "SUSE Bug 1036215", "url": "https://bugzilla.suse.com/1036215" }, { "category": "self", "summary": "SUSE Bug 1043598", "url": "https://bugzilla.suse.com/1043598" }, { "category": "self", "summary": "SUSE Bug 1044596", "url": "https://bugzilla.suse.com/1044596" }, { "category": "self", "summary": "SUSE Bug 1056415", "url": "https://bugzilla.suse.com/1056415" }, { "category": "self", "summary": "SUSE Bug 1056427", "url": "https://bugzilla.suse.com/1056427" }, { "category": "self", "summary": "SUSE Bug 1060799", "url": "https://bugzilla.suse.com/1060799" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1075087", "url": "https://bugzilla.suse.com/1075087" }, { "category": "self", "summary": "SUSE Bug 1075091", "url": "https://bugzilla.suse.com/1075091" }, { "category": "self", "summary": "SUSE Bug 1075994", "url": "https://bugzilla.suse.com/1075994" }, { "category": "self", "summary": "SUSE Bug 1076263", "url": "https://bugzilla.suse.com/1076263" }, { "category": "self", "summary": "SUSE Bug 1080157", "url": "https://bugzilla.suse.com/1080157" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1082485", "url": "https://bugzilla.suse.com/1082485" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083125", "url": "https://bugzilla.suse.com/1083125" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1083650", "url": "https://bugzilla.suse.com/1083650" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1085058", "url": "https://bugzilla.suse.com/1085058" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085511", "url": "https://bugzilla.suse.com/1085511" }, { "category": "self", "summary": "SUSE Bug 1085958", "url": "https://bugzilla.suse.com/1085958" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1088242", "url": "https://bugzilla.suse.com/1088242" }, { "category": "self", "summary": "SUSE Bug 1088865", "url": "https://bugzilla.suse.com/1088865" }, { "category": "self", "summary": "SUSE Bug 1089023", "url": "https://bugzilla.suse.com/1089023" }, { "category": "self", "summary": "SUSE Bug 1089115", "url": "https://bugzilla.suse.com/1089115" }, { "category": "self", "summary": "SUSE Bug 1089198", "url": "https://bugzilla.suse.com/1089198" }, { "category": "self", "summary": "SUSE Bug 1089393", "url": "https://bugzilla.suse.com/1089393" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089644", "url": "https://bugzilla.suse.com/1089644" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1089925", "url": "https://bugzilla.suse.com/1089925" }, { "category": "self", "summary": "SUSE Bug 1090225", "url": "https://bugzilla.suse.com/1090225" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE Bug 1090658", "url": "https://bugzilla.suse.com/1090658" }, { "category": "self", "summary": "SUSE Bug 1090663", "url": "https://bugzilla.suse.com/1090663" }, { "category": "self", "summary": "SUSE Bug 1090708", "url": "https://bugzilla.suse.com/1090708" }, { "category": "self", "summary": "SUSE Bug 1090718", "url": "https://bugzilla.suse.com/1090718" }, { "category": "self", "summary": "SUSE Bug 1090734", "url": "https://bugzilla.suse.com/1090734" }, { "category": "self", "summary": "SUSE Bug 1090953", "url": "https://bugzilla.suse.com/1090953" }, { "category": "self", "summary": "SUSE Bug 1091041", "url": "https://bugzilla.suse.com/1091041" }, { "category": "self", "summary": "SUSE Bug 1091325", "url": "https://bugzilla.suse.com/1091325" }, { "category": "self", "summary": "SUSE Bug 1091728", "url": "https://bugzilla.suse.com/1091728" }, { "category": "self", "summary": "SUSE Bug 1091925", "url": "https://bugzilla.suse.com/1091925" }, { "category": "self", "summary": "SUSE Bug 1091960", "url": "https://bugzilla.suse.com/1091960" }, { "category": "self", "summary": "SUSE Bug 1092289", "url": "https://bugzilla.suse.com/1092289" }, { "category": "self", "summary": "SUSE Bug 1092497", "url": "https://bugzilla.suse.com/1092497" }, { "category": "self", "summary": "SUSE Bug 1092566", "url": "https://bugzilla.suse.com/1092566" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1093008", "url": "https://bugzilla.suse.com/1093008" }, { "category": "self", "summary": "SUSE Bug 1093144", "url": "https://bugzilla.suse.com/1093144" }, { "category": "self", "summary": "SUSE Bug 1093215", "url": "https://bugzilla.suse.com/1093215" }, { "category": "self", "summary": "SUSE Bug 1094019", "url": "https://bugzilla.suse.com/1094019" }, { "category": "self", "summary": "SUSE Bug 802154", "url": "https://bugzilla.suse.com/802154" }, { "category": "self", "summary": "SUSE Bug 966170", "url": "https://bugzilla.suse.com/966170" }, { "category": "self", "summary": "SUSE Bug 966172", "url": "https://bugzilla.suse.com/966172" }, { "category": "self", "summary": "SUSE Bug 966186", "url": "https://bugzilla.suse.com/966186" }, { "category": "self", "summary": "SUSE Bug 966191", "url": "https://bugzilla.suse.com/966191" }, { "category": "self", "summary": "SUSE Bug 969476", "url": "https://bugzilla.suse.com/969476" }, { "category": "self", "summary": "SUSE Bug 969477", "url": "https://bugzilla.suse.com/969477" }, { "category": "self", "summary": "SUSE Bug 981348", "url": "https://bugzilla.suse.com/981348" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1065 page", "url": "https://www.suse.com/security/cve/CVE-2018-1065/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-05-22T11:33:23Z", "generator": { "date": "2018-05-22T11:33:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1366-1", "initial_release_date": "2018-05-22T11:33:23Z", "revision_history": [ { "date": "2018-05-22T11:33:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-obs-build-4.4.131-94.29.1.aarch64", "product": { "name": "kernel-obs-build-4.4.131-94.29.1.aarch64", "product_id": "kernel-obs-build-4.4.131-94.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.131-94.29.1.aarch64", "product": { "name": "kernel-default-4.4.131-94.29.1.aarch64", "product_id": "kernel-default-4.4.131-94.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.131-94.29.1.aarch64", "product": { "name": "kernel-default-base-4.4.131-94.29.1.aarch64", "product_id": "kernel-default-base-4.4.131-94.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.131-94.29.1.aarch64", "product": { "name": "kernel-default-devel-4.4.131-94.29.1.aarch64", "product_id": "kernel-default-devel-4.4.131-94.29.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.131-94.29.1.aarch64", "product": { "name": "kernel-syms-4.4.131-94.29.1.aarch64", "product_id": "kernel-syms-4.4.131-94.29.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.131-94.29.1.noarch", "product": { "name": "kernel-devel-4.4.131-94.29.1.noarch", "product_id": "kernel-devel-4.4.131-94.29.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.131-94.29.1.noarch", "product": { "name": "kernel-macros-4.4.131-94.29.1.noarch", "product_id": "kernel-macros-4.4.131-94.29.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.131-94.29.1.noarch", "product": { "name": "kernel-source-4.4.131-94.29.1.noarch", "product_id": "kernel-source-4.4.131-94.29.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.131-94.29.1.noarch", "product": { "name": "kernel-docs-4.4.131-94.29.1.noarch", "product_id": "kernel-docs-4.4.131-94.29.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.131-94.29.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.131-94.29.1.ppc64le", "product_id": "dlm-kmp-default-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "product": { "name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "product_id": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.131-94.29.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.131-94.29.1.ppc64le", "product_id": "kernel-obs-build-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.131-94.29.1.ppc64le", "product": { "name": "kernel-default-4.4.131-94.29.1.ppc64le", "product_id": "kernel-default-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.131-94.29.1.ppc64le", "product": { "name": "kernel-default-base-4.4.131-94.29.1.ppc64le", "product_id": "kernel-default-base-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.131-94.29.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.131-94.29.1.ppc64le", "product_id": "kernel-default-devel-4.4.131-94.29.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.131-94.29.1.ppc64le", "product": { "name": "kernel-syms-4.4.131-94.29.1.ppc64le", "product_id": "kernel-syms-4.4.131-94.29.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.131-94.29.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.131-94.29.1.s390x", "product_id": "cluster-md-kmp-default-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.131-94.29.1.s390x", "product": { "name": "dlm-kmp-default-4.4.131-94.29.1.s390x", "product_id": "dlm-kmp-default-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.131-94.29.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.131-94.29.1.s390x", "product_id": "gfs2-kmp-default-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.131-94.29.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.131-94.29.1.s390x", "product_id": "ocfs2-kmp-default-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.131-94.29.1.s390x", "product": { "name": "kernel-obs-build-4.4.131-94.29.1.s390x", "product_id": "kernel-obs-build-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.131-94.29.1.s390x", "product": { "name": "kernel-default-4.4.131-94.29.1.s390x", "product_id": "kernel-default-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.131-94.29.1.s390x", "product": { "name": "kernel-default-base-4.4.131-94.29.1.s390x", "product_id": "kernel-default-base-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.131-94.29.1.s390x", "product": { "name": "kernel-default-devel-4.4.131-94.29.1.s390x", "product_id": "kernel-default-devel-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.131-94.29.1.s390x", "product": { "name": "kernel-default-man-4.4.131-94.29.1.s390x", "product_id": "kernel-default-man-4.4.131-94.29.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.131-94.29.1.s390x", "product": { "name": "kernel-syms-4.4.131-94.29.1.s390x", "product_id": "kernel-syms-4.4.131-94.29.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.131-94.29.1.x86_64", "product": { "name": "kernel-default-4.4.131-94.29.1.x86_64", "product_id": "kernel-default-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.131-94.29.1.x86_64", "product": { "name": "kernel-default-devel-4.4.131-94.29.1.x86_64", "product_id": "kernel-default-devel-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.131-94.29.1.x86_64", "product": { "name": "kernel-default-extra-4.4.131-94.29.1.x86_64", "product_id": "kernel-default-extra-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.131-94.29.1.x86_64", "product": { "name": "kernel-syms-4.4.131-94.29.1.x86_64", "product_id": "kernel-syms-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.131-94.29.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.131-94.29.1.x86_64", "product_id": "dlm-kmp-default-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.131-94.29.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.131-94.29.1.x86_64", "product_id": "gfs2-kmp-default-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "product": { "name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "product_id": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.131-94.29.1.x86_64", "product": { "name": "kernel-obs-build-4.4.131-94.29.1.x86_64", "product_id": "kernel-obs-build-4.4.131-94.29.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.131-94.29.1.x86_64", "product": { "name": "kernel-default-base-4.4.131-94.29.1.x86_64", "product_id": "kernel-default-base-4.4.131-94.29.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-devel-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-macros-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-source-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-syms-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64" }, "product_reference": "kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-docs-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-obs-build-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-obs-build-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-obs-build-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-obs-build-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-default-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-default-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-man-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-devel-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-macros-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-source-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-syms-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-syms-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-syms-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-syms-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-default-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-default-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-base-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-default-man-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-devel-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-macros-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.131-94.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch" }, "product_reference": "kernel-source-4.4.131-94.29.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64" }, "product_reference": "kernel-syms-4.4.131-94.29.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le" }, "product_reference": "kernel-syms-4.4.131-94.29.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x" }, "product_reference": "kernel-syms-4.4.131-94.29.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-syms-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.131-94.29.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.131-94.29.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "low" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1065" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1065", "url": "https://www.suse.com/security/cve/CVE-2018-1065" }, { "category": "external", "summary": "SUSE Bug 1083650 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1083650" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "moderate" } ], "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "moderate" } ], "title": "CVE-2018-7492" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_131-94_29-default-1-4.5.2.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.131-94.29.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.131-94.29.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.131-94.29.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-05-22T11:33:23Z", "details": "important" } ], "title": "CVE-2018-8781" } ] }
suse-su-2018:1816-1
Vulnerability from csaf_suse
Published
2018-06-26 11:39
Modified
2018-06-26 11:39
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.138 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by
calling setxattr twice with two different extended attribute names on the same
file. This vulnerability could be triggered by an unprivileged user with the
ability to create files and execute programs (bsc#1097234)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
registers) between processes. These registers might contain encryption keys
when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
nid, which allowed local users to cause a denial of service (race condition) or
possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
option that triggers a NULL value for a flush_cmd_control data structure
(bnc#1086400)
- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers
to obtain potentially sensitive information from kernel memory, aka a
write_mmio stack-based out-of-bounds read (bnc#1073311)
- CVE-2018-3639: Systems with microprocessors utilizing speculative execution
and speculative execution of memory reads the addresses of all prior memory
writes are known may have allowed unauthorized disclosure of information to an
attacker with local user access via a side-channel analysis, aka Speculative
Store Bypass (SSB), Variant 4 (bsc#1087082).
- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability
allowing local users with access to the udldrmfb driver to obtain full read and
write permissions on kernel physical pages, resulting in a code execution in
kernel space (bsc#1090643).
- CVE-2017-13305: Prevent information disclosure vulnerability in
encrypted-keys (bsc#1094353)
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
cause a denial of service (out-of-bounds read and system crash) via a crafted
ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers
(bsc#1087095)
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
crc32c checksum driver, which allowed attackers to cause a denial of service
(ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
ext4 image (bsc#1087007)
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
with a zero i_links_count, which allowed attackers to cause a denial of service
(ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
image (bsc#1087012)
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bsc#1092904)
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
handling SCTP packets length that could have been exploited to cause a kernel
crash (bnc#1083900)
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
that contains a jump but lacks a user-defined chain, which allowed local users
to cause a denial of service (NULL pointer dereference) by leveraging the
CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650)
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
__rds_rdma_map() function that allowed local attackers to cause a system panic
and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
(bsc#1082962)
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
could have caused a crash and possibly memory corruption (bsc#1089895)
The following non-security bugs were fixed:
- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).
- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).
- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).
- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).
- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).
- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).
- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).
- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).
- ALSA: aloop: Add missing cable lock to ctl API callbacks (bnc#1012382).
- ALSA: aloop: Mark paused device as inactive (bnc#1012382).
- ALSA: asihpi: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: control: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: control: fix a redundant-copy issue (bnc#1012382).
- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).
- ALSA: hda - New VIA controller suppor no-snoop path (bnc#1012382).
- ALSA: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).
- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).
- ALSA: hda/realtek - Add some fixes for ALC233 (bnc#1012382).
- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).
- ALSA: hda: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: hdspm: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: line6: Use correct endpoint type for midi output (bnc#1012382).
- ALSA: opl3: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).
- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).
- ALSA: pcm: Check PCM state at xfern compat ioctl (bnc#1012382).
- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).
- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).
- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).
- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).
- ALSA: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).
- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).
- ALSA: rme9652: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bnc#1012382).
- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).
- ALSA: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).
- ALSA: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).
- ALSA: timer: Fix pause event notification (bnc#1012382 bsc#973378).
- ALSA: timer: Fix pause event notification (bsc#973378).
- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).
- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).
- ALSA: vmaster: Propagate slave error (bnc#1012382).
- ARC: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).
- ARM: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).
- ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).
- ARM: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).
- ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).
- ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).
- ARM: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).
- ARM: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).
- ARM: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).
- ARM: OMAP: Fix dmtimer init for omap1 (bnc#1012382).
- ARM: amba: Do not read past the end of sysfs 'driver_override' buffer (bnc#1012382).
- ARM: amba: Fix race condition with driver_override (bnc#1012382).
- ARM: amba: Make driver_override output consistent with other buses (bnc#1012382).
- ARM: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).
- ARM: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).
- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).
- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).
- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).
- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).
- ASoC: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).
- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).
- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).
- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).
- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).
- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).
- Btrfs: Fix possible softlock on single core machines (bnc#1012382).
- Btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).
- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).
- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).
- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).
- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).
- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).
- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).
- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).
- Btrfs: fix xattr loss after power failure (bnc#1012382).
- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).
- Btrfs: set plug for fsync (bnc#1012382).
- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).
- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).
- Correct the prefix in references tag in previous patches (bsc#1041740).
- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).
- ENABLE_IBRS clobbers %rax which it shouldn't do
- Enable uinput driver (bsc#1092566).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fixes typo for (watchdog: hpwdt: Update nmi_panic message) (bsc#1085185).
- Force log to disk before reading the AGF during a fstrim (bnc#1012382).
- HID: Fix hid_report_len usage (bnc#1012382).
- HID: core: Fix size as type u32 (bnc#1012382).
- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).
- HID: i2c-hid: fix size check and type usage (bnc#1012382).
- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).
- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).
- IB/mlx5: Use unlimited rate when static rate is not supported (bnc#1012382).
- IB/srp: Fix completion vector assignment algorithm (bnc#1012382).
- IB/srp: Fix srp_abort() (bnc#1012382).
- Input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).
- Input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).
- Input: ALPS - fix trackstick button handling on V8 devices (git-fixes).
- Input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).
- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bnc#1012382).
- Input: drv260x - fix initializing overdrive voltage (bnc#1012382).
- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).
- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).
- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).
- Input: leds - fix out of bound access (bnc#1012382).
- KEYS: DNS: limit the length of option strings (bnc#1012382).
- KVM: Fix spelling mistake: 'cop_unsuable' -> 'cop_unusable' (bnc#1012382).
- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).
- KVM: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).
- KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).
- KVM: s390: Enable all facility bits that are known good for passthrough (bnc#1012382 bsc#1073059 bsc#1076805).
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- KVM: x86: introduce linear_{read,write}_system (bnc#1012382).
- KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).
- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).
- MIPS: Fix ptrace(2) PTRACE_PEEKUSR and PTRACE_POKEUSR accesses to o32 FGRs (bnc#1012382).
- MIPS: Octeon: Fix logging messages with spurious periods after newlines (bnc#1012382).
- MIPS: TXx9: use IS_BUILTIN() for CONFIG_LEDS_CLASS (bnc#1012382).
- MIPS: ath79: Fix AR724X_PLL_REG_PCIE_CONFIG offset (bnc#1012382).
- MIPS: memset.S: EVA and fault support for small_memset (bnc#1012382).
- MIPS: memset.S: Fix clobber of v1 in last_fixup (bnc#1012382).
- MIPS: memset.S: Fix return of __clear_user from Lpartial_fixup (bnc#1012382).
- MIPS: prctl: Disallow FRE without FR with PR_SET_FP_MODE requests (bnc#1012382).
- MIPS: ptrace: Expose FIR register through FP regset (bnc#1012382).
- MIPS: ptrace: Fix PTRACE_PEEKUSR requests for 64-bit FGRs (bnc#1012382).
- MIPS: uaccess: Add micromips clobbers to bzero invocation (bnc#1012382).
- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bnc#1012382).
- NFC: llcp: Limit size of SDP URI (bnc#1012382).
- NFSv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).
- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).
- PCI: Restore config space on runtime resume despite being unbound (bnc#1012382).
- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094268).
- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).
- RDMA/mlx5: Protect from shift operand overflow (bnc#1012382).
- RDMA/qedr: Fix doorbell bar mapping for dpi > 1 (bsc#1022604).
- RDMA/ucma: Allow resolving address w/o specifying source address (bnc#1012382).
- RDMA/ucma: Correct option size check using optlen (bnc#1012382).
- RDMA/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).
- RDS: IB: Fix null pointer issue (bnc#1012382).
- Revert 'ARM: dts: imx6qdl-wandboard: Fix audio channel swap' (bnc#1012382).
- Revert 'Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174' (bnc#1012382).
- Revert 'KVM: Fix stack-out-of-bounds read in write_mmio' (bnc#1083635).
- Revert 'ath10k: rebuild crypto header in rx data frames' (kabi).
- Revert 'ath10k: send (re)assoc peer command when NSS changed' (bnc#1012382).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- Revert 'ima: limit file hash setting by user to fix and log modes' (bnc#1012382).
- Revert 'ipc/shm: Fix shmat mmap nil-page protection' (bnc#1012382).
- Revert 'perf tests: Decompress kernel module before objdump' (bnc#1012382).
- Revert 'vti4: Do not override MTU passed on link creation via IFLA_MTU' (bnc#1012382).
- Revert 'watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).' This reverts commit 3e75a004de79c213a2c919144da3d413922661db.
- Revert 'x86/fpu: Hard-disable lazy FPU mode' (compatibility).
- USB: Accept bulk endpoints with 1024-byte maxpacket (bnc#1012382 bsc#1092888).
- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).
- USB: Increment wakeup count on remote wakeup (bnc#1012382).
- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).
- USB: serial: cp210x: add ID for NI USB serial console (bnc#1012382).
- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).
- USB: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).
- USB: serial: option: Add support for Quectel EP06 (bnc#1012382).
- USB: serial: option: adding support for ublox R410M (bnc#1012382).
- USB: serial: option: reimplement interface masking (bnc#1012382).
- USB: serial: simple: add libtransistor console (bnc#1012382).
- USB: serial: visor: handle potential invalid device configuration (bnc#1012382).
- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).
- Update config files, add expoline for s390x (bsc#1089393).
- af_key: Always verify length of provided sadb_key (bnc#1012382).
- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).
- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).
- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).
- arm64: Add 'ssbd' command-line option (bsc#1085308).
- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).
- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).
- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).
- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).
- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).
- arm64: alternatives: Add dynamic patching feature (bsc#1085308).
- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).
- arm64: do not call C code with el0's fp register (bsc#1085308).
- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).
- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).
- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).
- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).
- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).
- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).
- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).
- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).
- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).
- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).
- asm-generic: provide generic_pmdp_establish() (bnc#1012382).
- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).
- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).
- ath10k: rebuild crypto header in rx data frames (bnc#1012382).
- ath9k_hw: check if the chip failed to wake up (bnc#1012382).
- atm: zatm: Fix potential Spectre v1 (bnc#1012382).
- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).
- audit: return on memory error to avoid null pointer dereference (bnc#1012382).
- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).
- autofs: change autofs4_wait() to take struct path (bsc#1086716).
- autofs: mount point create should honour passed in mode (bnc#1012382).
- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).
- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).
- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).
- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).
- batman-adv: fix packet checksum in receive path (bnc#1012382).
- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).
- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).
- bcache: fix for allocator and register thread race (bnc#1012382).
- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).
- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).
- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).
- bcache: return attach error when no cache set exist (bnc#1012382).
- bdi: Fix oops in wb_workfn() (bnc#1012382).
- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)
- block/loop: fix deadlock after loop_set_status (bnc#1012382).
- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).
- block: sanity check for integrity intervals (bsc#1091728).
- bnx2x: use the right constant (bnc#1012382).
- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).
- bonding: do not allow rlb updates to invalid mac (bnc#1012382).
- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).
- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).
- bpf: map_get_next_key to return first key on NULL (bnc#1012382).
- brcmfmac: Fix check for ISO3166 code (bnc#1012382).
- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).
- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bnc#1012382).
- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).
- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).
- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).
- ceph: adding protection for showing cap reservation info (bsc#1089115).
- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).
- ceph: check if mds create snaprealm when setting quota (bsc#1089115).
- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).
- ceph: do not check quota for snap inode (bsc#1089115).
- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).
- ceph: fix race of queuing delayed caps (bsc#1096214).
- ceph: fix root quota realm check (bsc#1089115).
- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).
- ceph: fix st_nlink stat for directories (bsc#1093904).
- ceph: quota: add counter for snaprealms with quota (bsc#1089115).
- ceph: quota: add initial infrastructure to support cephfs quotas (bsc#1089115).
- ceph: quota: cache inode pointer in ceph_snap_realm (bsc#1089115).
- ceph: quota: do not allow cross-quota renames (bsc#1089115).
- ceph: quota: report root dir quota usage in statfs (bsc#1089115).
- ceph: quota: support for ceph.quota.max_bytes (bsc#1089115).
- ceph: quota: support for ceph.quota.max_files (bsc#1089115).
- ceph: quota: update MDS when max_bytes is approaching (bsc#1089115).
- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).
- cfg80211: further limit wiphy names to 64 bytes (git-fixes).
- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).
- cifs: Use file_dentry() (bsc#1093008).
- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).
- clk: Do not show the incorrect clock phase (bnc#1012382).
- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).
- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).
- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).
- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).
- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).
- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).
- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).
- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).
- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).
- config: arm64: enable Spectre-v4 per-thread mitigation
- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).
- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).
- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).
- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).
- crypto: af_alg - fix possible uninit-value in alg_bind() (bnc#1012382).
- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).
- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).
- cxgb4: Setup FW queues before registering netdev (bsc#1022743).
- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).
- dccp: fix tasklet usage (bnc#1012382).
- dccp: initialize ireq->ir_mark (bnc#1012382).
- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).
- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).
- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).
- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).
- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).
- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).
- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).
- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).
- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).
- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).
- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).
- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).
- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).
- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).
- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).
- drm/virtio: fix vq wait_event condition (bnc#1012382).
- drm/vmwgfx: Fix a buffer object leak (bnc#1012382).
- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).
- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).
- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).
- efi: Avoid potential crashes, fix the 'struct efi_pci_io_protocol_32' definition for mixed mode (bnc#1012382).
- enic: enable rq before updating rq descriptors (bnc#1012382).
- enic: set DMA mask to 47 bit (bnc#1012382).
- ext2: fix a block leak (bnc#1012382).
- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ext4: add validity checks for bitmap block numbers (bnc#1012382).
- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).
- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).
- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).
- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).
- ext4: fix bitmap position validation (bnc#1012382).
- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).
- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).
- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).
- fanotify: fix logic of events on child (bnc#1012382).
- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).
- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).
- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).
- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).
- fix io_destroy()/aio_complete() race (bnc#1012382).
- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).
- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).
- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).
- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).
- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).
- futex: futex_wake_op, do not fail on invalid op (git-fixes).
- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).
- getname_kernel() needs to make sure that ->name != ->iname in long case (bnc#1012382).
- gfs2: Fix fallocate chunk size (bnc#1012382).
- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).
- gpio: No NULL owner (bnc#1012382).
- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).
- gpmi-nand: Handle ECC Errors in erased pages (bnc#1012382).
- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).
- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).
- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).
- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).
- hwrng: stm32 - add reset during probe (bnc#1012382).
- hwtracing: stm: fix build error on some arches (bnc#1012382).
- hypfs_kill_super(): deal with failed allocations (bnc#1012382).
- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).
- i2c: rcar: check master irqs before slave irqs (bnc#1012382).
- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).
- i2c: rcar: init new messages in irq (bnc#1012382).
- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).
- i2c: rcar: refactor setup of a msg (bnc#1012382).
- i2c: rcar: remove spinlock (bnc#1012382).
- i2c: rcar: remove unused IOERROR state (bnc#1012382).
- i2c: rcar: revoke START request early (bnc#1012382).
- i2c: rcar: rework hw init (bnc#1012382).
- ibmvnic: Check CRQ command return codes (bsc#1094840).
- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).
- ibmvnic: Create separate initialization routine for resets (bsc#1094840).
- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).
- ibmvnic: Fix partial success login retries (bsc#1094840).
- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).
- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).
- ibmvnic: Handle error case when setting link state (bsc#1094840).
- ibmvnic: Introduce active CRQ state (bsc#1094840).
- ibmvnic: Introduce hard reset recovery (bsc#1094840).
- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).
- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).
- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).
- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).
- iio:kfifo_buf: check for uint overflow (bnc#1012382).
- ima: Fallback to the builtin hash algorithm (bnc#1012382).
- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).
- init: fix false positives in W+X checking (bsc#1096982).
- iommu/vt-d: Fix a potential memory leak (bnc#1012382).
- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).
- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).
- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).
- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).
- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799).
- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).
- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).
- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).
- ipv4: remove warning in ip_recv_error (bnc#1012382).
- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- ipvs: fix rtnl_lock lockups caused by start_sync_thread (bnc#1012382).
- irda: fix overly long udelay() (bnc#1012382).
- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).
- isdn: eicon: fix a missing-check bug (bnc#1012382).
- jbd2: fix use after free in kjournald2() (bnc#1012382).
- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).
- jffs2: Fix use-after-free bug in jffs2_iget()'s error handling path (bnc#1012382 git-fixes).
- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).
- kABI: work around BPF SSBD removal (bsc#1087082).
- kabi: vfs: Restore dentry_operations->d_manage (bsc#1086716).
- kasan: fix memory hotplug during boot (bnc#1012382).
- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).
- kconfig: Do not leak main menus during parsing (bnc#1012382).
- kconfig: Fix automatic menu creation mem leak (bnc#1012382).
- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).
- kdb: make 'mdr' command repeat (bnc#1012382).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).
- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).
- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, ).
- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- kobject: do not use WARN for registration failures (bnc#1012382).
- kvm: Fix nopvspin static branch init usage (bsc#1056427).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).
- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).
- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).
- l2tp: revert 'l2tp: fix missing print session offset info' (bnc#1012382).
- lan78xx: Correctly indicate invalid OTP (bnc#1012382).
- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bnc#1012382).
- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).
- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).
- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).
- libceph: fix misjudgement of maximum monitor number (bsc#1089115).
- libceph: reschedule a tick in finish_hunting() (bsc#1089115).
- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).
- libceph: validate con->state at the top of try_write() (bsc#1089115).
- libnvdimm, dax: fix 1GB-aligned namespaces vs physical misalignment
- libnvdimm, namespace: use a safe lookup for dimm device name
- libnvdimm, pfn: fix start_pad handling for aligned namespaces
- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299).
- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299).
- llc: better deal with too small mtu (bnc#1012382).
- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).
- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).
- llc: hold llc_sap before release_sock() (bnc#1012382).
- llc: properly handle dev_queue_xmit() return value (bnc#1012382).
- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).
- locking/qspinlock: Ensure node->count is updated before initialising node (bnc#1012382).
- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).
- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).
- loop: handle short DIO reads (bsc#1094177).
- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).
- mac80211: Add RX flag to indicate ICV stripped (bnc#1012382).
- mac80211: allow not sending MIC up from driver for HW crypto (bnc#1012382).
- mac80211: allow same PN for AMSDU sub-frames (bnc#1012382).
- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).
- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).
- md/raid1: fix NULL pointer dereference (bnc#1012382).
- md: document lifetime of internal rdev pointer (bsc#1056415).
- md: fix two problems with setting the 're-add' device state (bsc#1089023).
- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).
- md: raid5: avoid string overflow warning (bnc#1012382).
- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).
- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).
- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).
- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).
- media: em28xx: USB bulk packet size fix (bnc#1012382).
- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).
- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).
- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).
- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).
- mm/ksm: fix interaction with THP (bnc#1012382).
- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).
- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).
- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).
- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).
- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (-- VM bnc#1012382 bnc#971975 generic performance read).
- mm: filemap: remove redundant code in do_read_cache_page (-- VM bnc#1012382 bnc#971975 generic performance read).
- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).
- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).
- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).
- mmap: introduce sane default mmap limits (bnc#1012382).
- mmap: relax file size limit for regular files (bnc#1012382).
- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).
- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).
- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).
- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).
- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).
- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).
- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).
- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).
- net/mlx5: Protect from command bit overflow (bnc#1012382).
- net/packet: refine check for priv area size (bnc#1012382).
- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).
- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).
- net: Fix untag for vlan packets without ethernet header (bnc#1012382).
- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).
- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).
- net: atm: Fix potential Spectre v1 (bnc#1012382).
- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).
- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).
- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).
- net: fix rtnh_ok() (bnc#1012382).
- net: fix uninit-value in __hw_addr_add_ex() (bnc#1012382).
- net: initialize skb->peeked when cloning (bnc#1012382).
- net: metrics: add proper netlink validation (bnc#1012382).
- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).
- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).
- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).
- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).
- net: test tailroom before appending to linear skb (bnc#1012382).
- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).
- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).
- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).
- netdev-FAQ: clarify DaveM's position for stable backports (bnc#1012382).
- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).
- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).
- netlink: fix uninit-value in netlink_sendmsg (bnc#1012382).
- nfit, address-range-scrub: fix scrub in-progress reporting
- nfit: fix region registration vs block-data-window ranges
- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).
- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).
- nvme-pci: Fix EEH failure on ppc (bsc#1093533).
- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).
- nvme: target: fix buffer overflow (bsc#993388).
- ocfs2/acl: use 'ip_xattr_sem' to protect getting extended attribute (bnc#1012382).
- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).
- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).
- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1070404).
- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).
- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).
- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).
- packet: fix bitfield update race (bnc#1012382).
- packet: fix reserve calculation (bnc#1012382 git-fixes).
- packet: fix reserve calculation (git-fixes).
- packet: in packet_snd start writing at link layer allocation (bnc#1012382).
- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).
- parisc: Fix out of array access in match_pci_device() (bnc#1012382).
- percpu: include linux/sched.h for cond_resched() (bnc#1012382).
- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).
- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).
- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).
- perf intel-pt: Fix sync_switch (bnc#1012382).
- perf intel-pt: Fix timestamp following overflow (bnc#1012382).
- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).
- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).
- perf/cgroup: Fix child event counting bug (bnc#1012382).
- perf/core: Fix perf_output_read_group() (bnc#1012382).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages[] (bnc#1012382).
- perf/core: Fix the perf_cpu_time_max_percent check (bnc#1012382).
- perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr (bnc#1012382).
- perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver (bnc#1012382).
- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (bnc#1012382).
- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (bnc#1012382).
- perf: Remove superfluous allocation error check (bnc#1012382).
- perf: Return proper values for user stack errors (bnc#1012382).
- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).
- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).
- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).
- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).
- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).
- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).
- powerpc/64s: Clear PCR on boot (bnc#1012382).
- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).
- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).
- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).
- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).
- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).
- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).
- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).
- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).
- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).
- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).
- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).
- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).
- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).
- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).
- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).
- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).
- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).
- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).
- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).
- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).
- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).
- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).
- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).
- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).
- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).
- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).
- powerpc: conditionally compile platform-specific serial drivers (bsc#1066223).
- powerpc: signals: Discard transaction state from signal frames (bsc#1094059).
- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).
- proc read mm's {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).
- proc: fix /proc/*/map_files lookup (bnc#1012382).
- proc: meminfo: estimate available memory more conservatively (-- VM bnc#1012382 functionality monitoring space user).
- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).
- qed: Fix LL2 race during connection terminate (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: Fix mask for physical address in ILT entry (bnc#1012382).
- qed: Fix possibility of list corruption during rmmod flows (bsc#1019695 bsc#1019699 bsc#1022604).
- qed: LL2 flush isles when connection is closed (bsc#1019695 bsc#1019699 bsc#1022604).
- qede: Fix ref-cnt usage count (bsc#1019695 bsc#1019699 bsc#1022604).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).
- r8152: add Linksys USB3GIGV1 id (bnc#1012382).
- r8152: fix tx packets accounting (bnc#1012382).
- r8169: fix powering up RTL8168h (bnc#1012382).
- radeon: hide pointless #warning when compile testing (bnc#1012382).
- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).
- regulator: gpio: Fix some error handling paths in 'gpio_regulator_probe()' (bsc#1091960).
- regulator: of: Add a missing 'of_node_put()' in an error handling path of 'of_regulator_match()' (bnc#1012382).
- regulatory: add NUL to request alpha2 (bnc#1012382).
- resource: fix integer overflow at reallocation (bnc#1012382).
- rfkill: gpio: fix memory leak in probe error path (bnc#1012382).
- rpc_pipefs: fix double-dput() (bnc#1012382).
- rpm/config.sh: build against SP3 in OBS as well.
- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).
- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).
- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).
- rtl8187: Fix NULL pointer dereference in priv->conf_mutex (bnc#1012382).
- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).
- rtnetlink: validate attributes in do_setlink() (bnc#1012382).
- s390/alternative: use a copy of the facility bit mask (bnc#1012382).
- s390/cio: clear timer when terminating driver I/O (bnc#1012382).
- s390/cio: fix return code after missing interrupt (bnc#1012382).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero ( bnc#1012382 bnc#1094532).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1094532, ).
- s390/dasd: fix IO error for newly defined devices (bnc#1093144, ).
- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).
- s390/ftrace: use expoline for indirect branches (bnc#1012382).
- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).
- s390/kernel: use expoline for indirect branches (bnc#1012382).
- s390/lib: use expoline for indirect branches (bnc#1012382).
- s390/qdio: do not merge ERROR output buffers (bnc#1012382).
- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).
- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).
- s390/qdio: fix access to uninitialized qdio_q fields ( bnc#1012382 bnc#1094532).
- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1094532, ).
- s390/qeth: consolidate errno translation (bnc#1093144, ).
- s390/qeth: fix MAC address update sequence (bnc#1093144, ).
- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, ).
- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).
- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).
- s390: add assembler macros for CPU alternatives (bnc#1012382).
- s390: add automatic detection of the spectre defense (bnc#1012382).
- s390: add optimized array_index_mask_nospec (bnc#1012382).
- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).
- s390: add sysfs attributes for spectre (bnc#1012382).
- s390: correct module section names for expoline code revert (bnc#1012382).
- s390: correct nospec auto detection init order (bnc#1012382).
- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).
- s390: enable CPU alternatives unconditionally (bnc#1012382).
- s390: extend expoline to BC instructions (bnc#1012382).
- s390: introduce execute-trampolines for branches (bnc#1012382).
- s390: move expoline assembler macros to a header (bnc#1012382).
- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).
- s390: move spectre sysfs attribute code (bnc#1012382).
- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).
- s390: report spectre mitigation via syslog (bnc#1012382).
- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).
- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).
- s390: use expoline thunks in the BPF JIT (bnc#1012382).
- sched/rt: Fix rq->clock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).
- scsi: aacraid: Correct hba_send to include iu_type (bsc#1022607).
- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).
- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).
- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).
- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).
- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).
- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).
- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).
- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).
- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).
- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).
- scsi: mptsas: Disable WRITE SAME (bnc#1012382).
- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).
- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).
- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).
- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).
- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).
- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).
- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).
- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).
- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).
- scsi: zfcp: fix infinite iteration on ERP ready list ( bnc#1012382 bnc#1094532).
- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1094532, ).
- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).
- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: fix the issue that the cookie-ack with auth can't get processed (bnc#1012382).
- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).
- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).
- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).
- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).
- selftests: Print the test we're running to /dev/kmsg (bnc#1012382).
- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).
- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).
- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).
- selftests: memfd: add config fragment for fuse (bnc#1012382).
- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).
- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).
- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: mctrl_gpio: Add missing module license (bnc#1012382).
- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).
- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).
- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).
- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).
- sh: New gcc support (bnc#1012382).
- sh: fix debug trap failure to process signals before return to user (bnc#1012382).
- signals: avoid unnecessary taking of sighand->siglock (-- Scheduler bnc#1012382 bnc#978907 performance signals).
- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).
- slip: Check if rstate is initialized before uncompressing (bnc#1012382).
- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).
- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).
- soreuseport: initialise timewait reuseport field (bnc#1012382).
- sparc64: Fix build warnings with gcc 7 (bnc#1012382).
- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).
- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).
- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).
- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).
- staging: rtl8192u: return -ENOMEM on failed allocation of priv->oldaddr (bnc#1012382).
- stm class: Use vmalloc for the master map (bnc#1012382).
- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).
- sunvnet: does not support GSO for sctp (bnc#1012382).
- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).
- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).
- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).
- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).
- tcp: do not read out-of-bounds opsize (bnc#1012382).
- tcp: fix TCP_REPAIR_QUEUE bound checking (bnc#1012382).
- tcp: ignore Fast Open on repair mode (bnc#1012382).
- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).
- tcp: purge write queue in tcp_connect_init() (bnc#1012382).
- team: avoid adding twice the same option to the event list (bnc#1012382).
- team: fix netconsole setup over team (bnc#1012382).
- team: use netdev_features_t instead of u32 (bnc#1012382).
- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).
- test_firmware: fix setting old custom fw path back on exit, second try (bnc#1012382).
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).
- there is probably a place where forcing _IBRS_OFF is missed (or is too late) and therefore ENABLE_IBRS is sometimes called early during boot while it should not. Let's drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012
- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).
- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).
- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).
- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).
- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).
- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).
- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).
- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).
- tools/thermal: tmon: fix for segfault (bnc#1012382).
- tpm: do not suspend/resume if power stays on (bnc#1012382).
- tpm: self test failure should not cause suspend to fail (bnc#1012382).
- tracepoint: Do not warn on ENOMEM (bnc#1012382).
- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).
- tracing/uprobe_event: Fix strncpy corner case (bnc#1012382).
- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).
- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).
- tracing: Fix regex_match_front() to not over compare the test string (bnc#1012382).
- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).
- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).
- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).
- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bnc#1012382).
- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).
- ubi: Fix error for write access (bnc#1012382).
- ubi: Reject MLC NAND (bnc#1012382).
- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).
- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).
- udf: Provide saner default for invalid uid / gid (bnc#1012382).
- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).
- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).
- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).
- usb: dwc2: Fix interval type issue (bnc#1012382).
- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).
- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).
- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).
- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).
- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).
- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).
- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).
- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).
- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).
- usb: musb: fix enumeration after resume (bnc#1012382).
- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).
- usb: musb: host: fix potential NULL pointer dereference (bnc#1012382).
- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).
- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).
- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).
- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).
- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).
- vfio-pci: Virtualize PCIe and AF FLR (bnc#1012382).
- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).
- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).
- vfs: add path_has_submounts() (bsc#1086716).
- vfs: add path_is_mountpoint() helper (bsc#1086716).
- vfs: change d_manage() to take a struct path (bsc#1086716).
- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).
- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).
- virtio: add ability to iterate over vqs (bnc#1012382).
- virtio_console: free buffers after reset (bnc#1012382).
- vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi (bnc#1012382).
- vmscan: do not force-scan file lru if its absolute size is small (-- VM bnc#1012382 page performance reclaim).
- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).
- vti4: Do not count header length twice on tunnel setup (bnc#1012382).
- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).
- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).
- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).
- watchdog: hpwdt: Modify to use watchdog core (bsc#1085185).
- watchdog: hpwdt: Update Module info and copyright (bsc#1085185).
- watchdog: hpwdt: Update nmi_panic message (bsc#1085185).
- watchdog: hpwdt: condition early return of NMI handler on iLO5 (bsc#1085185).
- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).
- workqueue: use put_device() instead of kfree() (bnc#1012382).
- writeback: safer lock nesting (bnc#1012382).
- x86/apic: Set up through-local-APIC mode on the boot CPU if 'noapic' specified (bnc#1012382).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).
- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD (bsc#1094019).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).
- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).
- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).
- x86/devicetree: Initialize device tree before using it (bnc#1012382).
- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).
- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).
- x86/fpu: Revert ('x86/fpu: Disable AVX when eagerfpu is off') (bnc#1012382).
- x86/hweight: Do not clobber %rdi (bnc#1012382).
- x86/hweight: Get rid of the special calling convention (bnc#1012382).
- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).
- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).
- x86/pkeys: Do not special case protection key 0 (1041740).
- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).
- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263).
- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263).
- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263).
- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).
- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263).
- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263).
- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263
- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263).
- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263).
- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).
- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).
- x86/topology: Update the 'cpu cores' field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).
- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).
- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).
- xen-netfront: Fix hang on device removal (bnc#1012382).
- xen-netfront: Fix race between device setup and open (bnc#1012382).
- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).
- xen/acpi: off by one in read_acpi_id() (bnc#1012382).
- xen/grant-table: Use put_page instead of free_page (bnc#1012382).
- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).
- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).
- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).
- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).
- xfrm_user: fix return value from xfrm_user_rcv_msg (bnc#1012382).
- xfs: always verify the log tail during recovery (bsc#1036215).
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).
- xfs: detect and trim torn writes during log recovery (bsc#1036215).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
- xfs: fix endianness error when checking log block crc on big endian platforms (bsc#1094405, bsc#1036215).
- xfs: fix incorrect log_flushed on fsync (bnc#1012382).
- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).
- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).
- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).
- xfs: prevent creating negative-sized file via INSERT_RANGE (bnc#1012382).
- xfs: refactor and open code log record crc check (bsc#1036215).
- xfs: refactor log record start detection into a new helper (bsc#1036215).
- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).
- xfs: return start block of first bad log record during recovery (bsc#1036215).
- xfs: support a crc verification only log record pass (bsc#1036215).
- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).
- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).
- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).
- zorro: Set up z->dev.dma_mask for the DMA API (bnc#1012382).
Patchnames
SUSE-SLE-RT-12-SP3-2018-1224
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP3 RT kernel was updated to 4.4.138 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by\n calling setxattr twice with two different extended attribute names on the same\n file. This vulnerability could be triggered by an unprivileged user with the\n ability to create files and execute programs (bsc#1097234)\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2017-18249: The add_free_nid function did not properly track an allocated\n nid, which allowed local users to cause a denial of service (race condition) or\n possibly have unspecified other impact via concurrent threads (bnc#1087036)\n- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge\n option that triggers a NULL value for a flush_cmd_control data structure\n (bnc#1086400)\n- CVE-2017-17741: The KVM implementation in the Linux kernel allowed attackers\n to obtain potentially sensitive information from kernel memory, aka a\n write_mmio stack-based out-of-bounds read (bnc#1073311)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution\n and speculative execution of memory reads the addresses of all prior memory\n writes are known may have allowed unauthorized disclosure of information to an\n attacker with local user access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bsc#1087082).\n- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability\n allowing local users with access to the udldrmfb driver to obtain full read and\n write permissions on kernel physical pages, resulting in a code execution in\n kernel space (bsc#1090643).\n- CVE-2017-13305: Prevent information disclosure vulnerability in\n encrypted-keys (bsc#1094353)\n- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to\n cause a denial of service (out-of-bounds read and system crash) via a crafted\n ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007)\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012)\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob\n that contains a jump but lacks a user-defined chain, which allowed local users\n to cause a denial of service (NULL pointer dereference) by leveraging the\n CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that\n could have caused a crash and possibly memory corruption (bsc#1089895)\n\nThe following non-security bugs were fixed:\n\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (bnc#1012382).\n- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bnc#1012382).\n- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).\n- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bnc#1012382).\n- ACPI: acpi_pad: Fix memory leak in power saving threads (bnc#1012382).\n- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bnc#1012382).\n- ACPICA: Events: add a return on failure from acpi_hw_register_read (bnc#1012382).\n- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bnc#1012382).\n- ALSA: aloop: Add missing cable lock to ctl API callbacks (bnc#1012382).\n- ALSA: aloop: Mark paused device as inactive (bnc#1012382).\n- ALSA: asihpi: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: control: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: control: fix a redundant-copy issue (bnc#1012382).\n- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bnc#1012382).\n- ALSA: hda - New VIA controller suppor no-snoop path (bnc#1012382).\n- ALSA: hda - Use IS_REACHABLE() for dependency on input (bnc#1012382 bsc#1031717).\n- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).\n- ALSA: hda/realtek - Add some fixes for ALC233 (bnc#1012382).\n- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bnc#1012382).\n- ALSA: hda: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: hdspm: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: line6: Use correct endpoint type for midi output (bnc#1012382).\n- ALSA: opl3: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: oss: consolidate kmalloc/memset 0 call to kzalloc (bnc#1012382).\n- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bnc#1012382).\n- ALSA: pcm: Check PCM state at xfern compat ioctl (bnc#1012382).\n- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bnc#1012382).\n- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bnc#1012382).\n- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bnc#1012382).\n- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bnc#1012382).\n- ALSA: pcm: Use ERESTARTSYS instead of EINTR in OSS emulation (bnc#1012382).\n- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bnc#1012382).\n- ALSA: rme9652: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bnc#1012382).\n- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bnc#1012382).\n- ALSA: seq: oss: Hardening for potential Spectre v1 (bnc#1012382).\n- ALSA: timer: Call notifier in the same spinlock (bnc#1012382 bsc#973378).\n- ALSA: timer: Fix pause event notification (bnc#1012382 bsc#973378).\n- ALSA: timer: Fix pause event notification (bsc#973378).\n- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bnc#1012382).\n- ALSA: vmaster: Propagate slave error (bnc#1012382).\n- ARC: Fix malformed ARC_EMUL_UNALIGNED default (bnc#1012382).\n- ARM: 8748/1: mm: Define vdso_start, vdso_end as array (bnc#1012382).\n- ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed (bnc#1012382).\n- ARM: 8770/1: kprobes: Prohibit probing on optimized_callback (bnc#1012382).\n- ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr (bnc#1012382).\n- ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions (bnc#1012382).\n- ARM: OMAP1: clock: Fix debugfs_create_*() usage (bnc#1012382).\n- ARM: OMAP2+: timer: fix a kmemleak caused in omap_get_timer_dt (bnc#1012382).\n- ARM: OMAP3: Fix prm wake interrupt for resume (bnc#1012382).\n- ARM: OMAP: Fix dmtimer init for omap1 (bnc#1012382).\n- ARM: amba: Do not read past the end of sysfs \u0027driver_override\u0027 buffer (bnc#1012382).\n- ARM: amba: Fix race condition with driver_override (bnc#1012382).\n- ARM: amba: Make driver_override output consistent with other buses (bnc#1012382).\n- ARM: dts: at91: at91sam9g25: fix mux-mask pinctrl property (bnc#1012382).\n- ARM: dts: at91: sama5d4: fix pinctrl compatible string (bnc#1012382).\n- ASoC: Intel: sst: remove redundant variable dma_dev_name (bnc#1012382).\n- ASoC: au1x: Fix timeout tests in au1xac97c_ac97_read() (bnc#1012382 bsc#1031717).\n- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bnc#1012382).\n- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bnc#1012382).\n- ASoC: ssm2602: Replace reg_default_raw with reg_default (bnc#1012382).\n- ASoC: topology: create TLV data for dapm widgets (bnc#1012382).\n- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504, bsc#1095147).\n- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bnc#1012382).\n- Bluetooth: btusb: Add device ID for RTL8822BE (bnc#1012382).\n- Btrfs: Fix out of bounds access in btrfs_search_slot (bnc#1012382).\n- Btrfs: Fix possible softlock on single core machines (bnc#1012382).\n- Btrfs: Fix wrong first_key parameter in replace_path (Followup fix for bsc#1084721).\n- Btrfs: bail out on error during replay_dir_deletes (bnc#1012382).\n- Btrfs: fix NULL pointer dereference in log_dir_items (bnc#1012382).\n- Btrfs: fix copy_items() return value when logging an inode (bnc#1012382).\n- Btrfs: fix crash when trying to resume balance without the resume flag (bnc#1012382).\n- Btrfs: fix lockdep splat in btrfs_alloc_subvolume_writers (bnc#1012382).\n- Btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bnc#1012382).\n- Btrfs: fix scrub to repair raid6 corruption (bnc#1012382).\n- Btrfs: fix xattr loss after power failure (bnc#1012382).\n- Btrfs: send, fix issuing write op when processing hole in no data mode (bnc#1012382).\n- Btrfs: set plug for fsync (bnc#1012382).\n- Btrfs: tests/qgroup: Fix wrong tree backref level (bnc#1012382).\n- Clarify (and fix) MAX_LFS_FILESIZE macros (bnc#1012382).\n- Correct the prefix in references tag in previous patches (bsc#1041740).\n- Do not leak MNT_INTERNAL away from internal mounts (bnc#1012382).\n- ENABLE_IBRS clobbers %rax which it shouldn\u0027t do\n- Enable uinput driver (bsc#1092566).\n- Fix excessive newline in /proc/*/status (bsc#1094823).\n- Fixes typo for (watchdog: hpwdt: Update nmi_panic message) (bsc#1085185).\n- Force log to disk before reading the AGF during a fstrim (bnc#1012382).\n- HID: Fix hid_report_len usage (bnc#1012382).\n- HID: core: Fix size as type u32 (bnc#1012382).\n- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bnc#1012382).\n- HID: i2c-hid: fix size check and type usage (bnc#1012382).\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bnc#1012382).\n- IB/ipoib: Fix for potential no-carrier state (bnc#1012382).\n- IB/mlx5: Use unlimited rate when static rate is not supported (bnc#1012382).\n- IB/srp: Fix completion vector assignment algorithm (bnc#1012382).\n- IB/srp: Fix srp_abort() (bnc#1012382).\n- Input: ALPS - fix TrackStick support for SS5 hardware (git-fixes).\n- Input: ALPS - fix multi-touch decoding on SS4 plus touchpads (git-fixes).\n- Input: ALPS - fix trackstick button handling on V8 devices (git-fixes).\n- Input: ALPS - fix two-finger scroll breakage in right side on ALPS touchpad (git-fixes).\n- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bnc#1012382).\n- Input: drv260x - fix initializing overdrive voltage (bnc#1012382).\n- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bnc#1012382).\n- Input: elan_i2c_smbus - fix corrupted stack (bnc#1012382).\n- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bnc#1012382).\n- Input: leds - fix out of bound access (bnc#1012382).\n- KEYS: DNS: limit the length of option strings (bnc#1012382).\n- KVM: Fix spelling mistake: \u0027cop_unsuable\u0027 -\u003e \u0027cop_unusable\u0027 (bnc#1012382).\n- KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bnc#1012382).\n- KVM: VMX: raise internal error for exception during invalid protected mode state (bnc#1012382).\n- KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use (bnc#1012382).\n- KVM: s390: Enable all facility bits that are known good for passthrough (bnc#1012382 bsc#1073059 bsc#1076805).\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- KVM: x86: introduce linear_{read,write}_system (bnc#1012382).\n- KVM: x86: pass kvm_vcpu to kvm_read_guest_virt and kvm_write_guest_virt_system (bnc#1012382).\n- Kbuild: change CC_OPTIMIZE_FOR_SIZE definition (bnc#1012382).\n- MIPS: Fix ptrace(2) PTRACE_PEEKUSR and PTRACE_POKEUSR accesses to o32 FGRs (bnc#1012382).\n- MIPS: Octeon: Fix logging messages with spurious periods after newlines (bnc#1012382).\n- MIPS: TXx9: use IS_BUILTIN() for CONFIG_LEDS_CLASS (bnc#1012382).\n- MIPS: ath79: Fix AR724X_PLL_REG_PCIE_CONFIG offset (bnc#1012382).\n- MIPS: memset.S: EVA and fault support for small_memset (bnc#1012382).\n- MIPS: memset.S: Fix clobber of v1 in last_fixup (bnc#1012382).\n- MIPS: memset.S: Fix return of __clear_user from Lpartial_fixup (bnc#1012382).\n- MIPS: prctl: Disallow FRE without FR with PR_SET_FP_MODE requests (bnc#1012382).\n- MIPS: ptrace: Expose FIR register through FP regset (bnc#1012382).\n- MIPS: ptrace: Fix PTRACE_PEEKUSR requests for 64-bit FGRs (bnc#1012382).\n- MIPS: uaccess: Add micromips clobbers to bzero invocation (bnc#1012382).\n- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bnc#1012382).\n- NFC: llcp: Limit size of SDP URI (bnc#1012382).\n- NFSv4: always set NFS_LOCK_LOST when a lock is lost (bnc#1012382 bsc#1068951).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bnc#1012382).\n- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bnc#1012382).\n- PCI: Restore config space on runtime resume despite being unbound (bnc#1012382).\n- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094268).\n- RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure (bnc#1012382).\n- RDMA/mlx5: Protect from shift operand overflow (bnc#1012382).\n- RDMA/qedr: Fix doorbell bar mapping for dpi \u003e 1 (bsc#1022604).\n- RDMA/ucma: Allow resolving address w/o specifying source address (bnc#1012382).\n- RDMA/ucma: Correct option size check using optlen (bnc#1012382).\n- RDMA/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bnc#1012382).\n- RDS: IB: Fix null pointer issue (bnc#1012382).\n- Revert \u0027ARM: dts: imx6qdl-wandboard: Fix audio channel swap\u0027 (bnc#1012382).\n- Revert \u0027Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174\u0027 (bnc#1012382).\n- Revert \u0027KVM: Fix stack-out-of-bounds read in write_mmio\u0027 (bnc#1083635).\n- Revert \u0027ath10k: rebuild crypto header in rx data frames\u0027 (kabi).\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bnc#1012382).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- Revert \u0027ima: limit file hash setting by user to fix and log modes\u0027 (bnc#1012382).\n- Revert \u0027ipc/shm: Fix shmat mmap nil-page protection\u0027 (bnc#1012382).\n- Revert \u0027perf tests: Decompress kernel module before objdump\u0027 (bnc#1012382).\n- Revert \u0027vti4: Do not override MTU passed on link creation via IFLA_MTU\u0027 (bnc#1012382).\n- Revert \u0027watchdog: hpwdt: Remove legacy NMI sourcing (bsc#1085185).\u0027 This reverts commit 3e75a004de79c213a2c919144da3d413922661db.\n- Revert \u0027x86/fpu: Hard-disable lazy FPU mode\u0027 (compatibility).\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bnc#1012382 bsc#1092888).\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).\n- USB: Increment wakeup count on remote wakeup (bnc#1012382).\n- USB: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bnc#1012382).\n- USB: serial: cp210x: add ID for NI USB serial console (bnc#1012382).\n- USB: serial: cp210x: use tcflag_t to fix incompatible pointer type (bnc#1012382).\n- USB: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bnc#1012382).\n- USB: serial: option: Add support for Quectel EP06 (bnc#1012382).\n- USB: serial: option: adding support for ublox R410M (bnc#1012382).\n- USB: serial: option: reimplement interface masking (bnc#1012382).\n- USB: serial: simple: add libtransistor console (bnc#1012382).\n- USB: serial: visor: handle potential invalid device configuration (bnc#1012382).\n- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bnc#1012382).\n- Update config files, add expoline for s390x (bsc#1089393).\n- af_key: Always verify length of provided sadb_key (bnc#1012382).\n- affs_lookup(): close a race with affs_remove_link() (bnc#1012382).\n- aio: fix io_destroy(2) vs. lookup_ioctx() race (bnc#1012382).\n- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).\n- arm64: Add \u0027ssbd\u0027 command-line option (bsc#1085308).\n- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).\n- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).\n- arm64: Add this_cpu_ptr() assembler macro for use in entry.S (bsc#1085308).\n- arm64: Add work around for Arm Cortex-A55 Erratum 1024718 (bnc#1012382).\n- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).\n- arm64: alternatives: Add dynamic patching feature (bsc#1085308).\n- arm64: assembler: introduce ldr_this_cpu (bsc#1085308).\n- arm64: do not call C code with el0\u0027s fp register (bsc#1085308).\n- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).\n- arm64: introduce mov_q macro to move a constant into a 64-bit register (bnc#1012382 bsc#1068032).\n- arm64: lse: Add early clobbers to some input/output asm operands (bnc#1012382).\n- arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bnc#1012382).\n- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).\n- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).\n- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).\n- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).\n- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).\n- arm: dts: socfpga: fix GIC PPI warning (bnc#1012382).\n- asm-generic: provide generic_pmdp_establish() (bnc#1012382).\n- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bnc#1012382).\n- ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode (bnc#1012382).\n- ath10k: rebuild crypto header in rx data frames (bnc#1012382).\n- ath9k_hw: check if the chip failed to wake up (bnc#1012382).\n- atm: zatm: Fix potential Spectre v1 (bnc#1012382).\n- audit: move calcs after alloc and check when logging set loginuid (bnc#1012382).\n- audit: return on memory error to avoid null pointer dereference (bnc#1012382).\n- autofs: change autofs4_expire_wait()/do_expire_wait() to take struct path (bsc#1086716).\n- autofs: change autofs4_wait() to take struct path (bsc#1086716).\n- autofs: mount point create should honour passed in mode (bnc#1012382).\n- autofs: use path_has_submounts() to fix unreliable have_submount() checks (bsc#1086716).\n- autofs: use path_is_mountpoint() to fix unreliable d_mountpoint() checks (bsc#1086716).\n- batman-adv: fix header size check in batadv_dbg_arp() (bnc#1012382).\n- batman-adv: fix multicast-via-unicast transmission with AP isolation (bnc#1012382).\n- batman-adv: fix packet checksum in receive path (bnc#1012382).\n- batman-adv: fix packet loss for broadcasted DHCP packets to a server (bnc#1012382).\n- batman-adv: invalidate checksum on fragment reassembly (bnc#1012382).\n- bcache: fix for allocator and register thread race (bnc#1012382).\n- bcache: fix for data collapse after re-attaching an attached device (bnc#1012382).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bnc#1012382).\n- bcache: properly set task state in bch_writeback_thread() (bnc#1012382).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bnc#1012382).\n- bcache: return attach error when no cache set exist (bnc#1012382).\n- bdi: Fix oops in wb_workfn() (bnc#1012382).\n- blacklist.conf: Add an omapdrm entry (bsc#1090708, bsc#1090718)\n- block/loop: fix deadlock after loop_set_status (bnc#1012382).\n- block: cancel workqueue entries on blk_mq_freeze_queue() (bsc#1090435).\n- block: sanity check for integrity intervals (bsc#1091728).\n- bnx2x: use the right constant (bnc#1012382).\n- bnxt_en: Check valid VNIC ID in bnxt_hwrm_vnic_set_tpa() (bnc#1012382).\n- bonding: do not allow rlb updates to invalid mac (bnc#1012382).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (bnc#1012382).\n- bpf: fix selftests/bpf test_kmod.sh failure when CONFIG_BPF_JIT_ALWAYS_ON=y (bnc#1012382).\n- bpf: map_get_next_key to return first key on NULL (bnc#1012382).\n- brcmfmac: Fix check for ISO3166 code (bnc#1012382).\n- bridge: check iface upper dev when setting master via ioctl (bnc#1012382).\n- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bnc#1012382).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (bnc#1012382).\n- cdrom: do not call check_disk_change() inside cdrom_open() (bnc#1012382).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bnc#1012382).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (bsc#1089115).\n- ceph: delete unreachable code in ceph_check_caps() (bsc#1096214).\n- ceph: do not check quota for snap inode (bsc#1089115).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix race of queuing delayed caps (bsc#1096214).\n- ceph: fix root quota realm check (bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: fix st_nlink stat for directories (bsc#1093904).\n- ceph: quota: add counter for snaprealms with quota (bsc#1089115).\n- ceph: quota: add initial infrastructure to support cephfs quotas (bsc#1089115).\n- ceph: quota: cache inode pointer in ceph_snap_realm (bsc#1089115).\n- ceph: quota: do not allow cross-quota renames (bsc#1089115).\n- ceph: quota: report root dir quota usage in statfs (bsc#1089115).\n- ceph: quota: support for ceph.quota.max_bytes (bsc#1089115).\n- ceph: quota: support for ceph.quota.max_files (bsc#1089115).\n- ceph: quota: update MDS when max_bytes is approaching (bsc#1089115).\n- cfg80211: further limit wiphy names to 64 bytes (bnc#1012382 git-fixes).\n- cfg80211: further limit wiphy names to 64 bytes (git-fixes).\n- cfg80211: limit wiphy names to 128 bytes (bnc#1012382).\n- cifs: Use file_dentry() (bsc#1093008).\n- cifs: do not allow creating sockets except with SMB1 posix exensions (bnc#1012382).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bnc#1012382 bsc#1090734).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- clk: Do not show the incorrect clock phase (bnc#1012382).\n- clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bnc#1012382).\n- clk: mvebu: armada-38x: add support for 1866MHz variants (bnc#1012382).\n- clk: mvebu: armada-38x: add support for missing clocks (bnc#1012382).\n- clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bnc#1012382).\n- clk: samsung: exynos3250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5250: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5260: Fix PLL rates (bnc#1012382).\n- clk: samsung: exynos5433: Fix PLL rates (bnc#1012382).\n- clk: samsung: s3c2410: Fix PLL rates (bnc#1012382).\n- clocksource/drivers/arm_arch_timer: Avoid infinite recursion when ftrace is enabled (bsc#1090225).\n- clocksource/drivers/fsl_ftm_timer: Fix error return checking (bnc#1012382).\n- config: arm64: enable Spectre-v4 per-thread mitigation\n- cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bnc#1012382).\n- cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bnc#1012382).\n- cpufreq: intel_pstate: Enable HWP by default (bnc#1012382).\n- cpuidle: coupled: remove unused define cpuidle_coupled_lock (bnc#1012382).\n- crypto: af_alg - fix possible uninit-value in alg_bind() (bnc#1012382).\n- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bnc#1012382).\n- crypto: vmx - Remove overly verbose printk from AES init routines (bnc#1012382).\n- cxgb4: Setup FW queues before registering netdev (bsc#1022743).\n- dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (bnc#1012382).\n- dccp: fix tasklet usage (bnc#1012382).\n- dccp: initialize ireq-\u003eir_mark (bnc#1012382).\n- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).\n- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).\n- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).\n- dm thin: fix documentation relative to low water mark threshold (bnc#1012382).\n- dmaengine: at_xdmac: fix rare residue corruption (bnc#1012382).\n- dmaengine: ensure dmaengine helpers check valid callback (bnc#1012382).\n- dmaengine: pl330: fix a race condition in case of threaded irqs (bnc#1012382).\n- dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bnc#1012382).\n- dmaengine: usb-dmac: fix endless loop in usb_dmac_chan_terminate_all() (bnc#1012382).\n- do d_instantiate/unlock_new_inode combinations safely (bnc#1012382).\n- dp83640: Ensure against premature access to PHY registers after reset (bnc#1012382).\n- drm/exynos: fix comparison to bitshift when dealing with a mask (bnc#1012382).\n- drm/i915: Disable LVDS on Radiant P845 (bnc#1012382).\n- drm/radeon: Fix PCIe lane width calculation (bnc#1012382).\n- drm/rockchip: Respect page offset for PRIME mmap calls (bnc#1012382).\n- drm/virtio: fix vq wait_event condition (bnc#1012382).\n- drm/vmwgfx: Fix a buffer object leak (bnc#1012382).\n- drm: set FMODE_UNSIGNED_OFFSET for drm files (bnc#1012382).\n- e1000e: Fix check_for_link return value with autoneg off (bnc#1012382 bsc#1075428).\n- e1000e: allocate ring descriptors with dma_zalloc_coherent (bnc#1012382).\n- efi: Avoid potential crashes, fix the \u0027struct efi_pci_io_protocol_32\u0027 definition for mixed mode (bnc#1012382).\n- enic: enable rq before updating rq descriptors (bnc#1012382).\n- enic: set DMA mask to 47 bit (bnc#1012382).\n- ext2: fix a block leak (bnc#1012382).\n- ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: add validity checks for bitmap block numbers (bnc#1012382).\n- ext4: bugfix for mmaped pages in mpage_release_unused_pages() (bnc#1012382).\n- ext4: do not allow r/w mounts if metadata blocks overlap the superblock (bnc#1012382).\n- ext4: do not update checksum of new initialized bitmaps (bnc#1012382).\n- ext4: fail ext4_iget for root directory if unallocated (bnc#1012382).\n- ext4: fix bitmap position validation (bnc#1012382).\n- ext4: fix deadlock between inline_data and ext4_expand_extra_isize_ea() (bnc#1012382).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bnc#1012382).\n- ext4: set h_journal if there is a failure starting a reserved handle (bnc#1012382).\n- fanotify: fix logic of events on child (bnc#1012382).\n- fbdev: Fixing arbitrary kernel leak in case FBIOGETCMAP_SPARC in sbusfb_ioctl_helper() (bnc#1012382).\n- firewire-ohci: work around oversized DMA reads on JMicron controllers (bnc#1012382).\n- firmware: dmi: handle missing DMI data gracefully (bsc#1096037).\n- firmware: dmi_scan: Fix handling of empty DMI strings (bnc#1012382).\n- fix io_destroy()/aio_complete() race (bnc#1012382).\n- fs/proc/proc_sysctl.c: fix potential page fault while unregistering sysctl table (bnc#1012382).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bnc#1012382).\n- fscache: Fix hanging wait on page discarded by writeback (bnc#1012382).\n- futex: Remove duplicated code and fix undefined behaviour (bnc#1012382).\n- futex: Remove unnecessary warning from get_futex_key (bnc#1012382).\n- futex: futex_wake_op, do not fail on invalid op (git-fixes).\n- futex: futex_wake_op, fix sign_extend32 sign bits (bnc#1012382).\n- getname_kernel() needs to make sure that -\u003ename != -\u003einame in long case (bnc#1012382).\n- gfs2: Fix fallocate chunk size (bnc#1012382).\n- gianfar: Fix Rx byte accounting for ndev stats (bnc#1012382).\n- gpio: No NULL owner (bnc#1012382).\n- gpio: rcar: Add Runtime PM handling for interrupts (bnc#1012382).\n- gpmi-nand: Handle ECC Errors in erased pages (bnc#1012382).\n- hfsplus: stop workqueue when fill_super() failed (bnc#1012382).\n- hwmon: (nct6775) Fix writing pwmX_mode (bnc#1012382).\n- hwmon: (pmbus/adm1275) Accept negative page register values (bnc#1012382).\n- hwmon: (pmbus/max8688) Accept negative page register values (bnc#1012382).\n- hwrng: stm32 - add reset during probe (bnc#1012382).\n- hwtracing: stm: fix build error on some arches (bnc#1012382).\n- hypfs_kill_super(): deal with failed allocations (bnc#1012382).\n- i2c: mv64xxx: Apply errata delay only in standard mode (bnc#1012382).\n- i2c: rcar: check master irqs before slave irqs (bnc#1012382).\n- i2c: rcar: do not issue stop when HW does it automatically (bnc#1012382).\n- i2c: rcar: init new messages in irq (bnc#1012382).\n- i2c: rcar: make sure clocks are on when doing clock calculation (bnc#1012382).\n- i2c: rcar: refactor setup of a msg (bnc#1012382).\n- i2c: rcar: remove spinlock (bnc#1012382).\n- i2c: rcar: remove unused IOERROR state (bnc#1012382).\n- i2c: rcar: revoke START request early (bnc#1012382).\n- i2c: rcar: rework hw init (bnc#1012382).\n- ibmvnic: Check CRQ command return codes (bsc#1094840).\n- ibmvnic: Clean actual number of RX or TX pools (bsc#1092289).\n- ibmvnic: Create separate initialization routine for resets (bsc#1094840).\n- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).\n- ibmvnic: Fix partial success login retries (bsc#1094840).\n- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).\n- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).\n- ibmvnic: Handle error case when setting link state (bsc#1094840).\n- ibmvnic: Introduce active CRQ state (bsc#1094840).\n- ibmvnic: Introduce hard reset recovery (bsc#1094840).\n- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).\n- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).\n- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).\n- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).\n- iio:kfifo_buf: check for uint overflow (bnc#1012382).\n- ima: Fallback to the builtin hash algorithm (bnc#1012382).\n- ima: Fix Kconfig to select TPM 2.0 CRB interface (bnc#1012382).\n- init: fix false positives in W+X checking (bsc#1096982).\n- iommu/vt-d: Fix a potential memory leak (bnc#1012382).\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (bnc#1012382).\n- ipc/shm: fix shmat() nil address after round-down when remapping (bnc#1012382).\n- ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1012382).\n- ipmi/powernv: Fix error return code in ipmi_powernv_probe() (bnc#1012382).\n- ipmi: create hardware-independent softdep for ipmi_devintf (bsc#1009062, bsc#1060799).\n- ipmi_ssif: Fix kernel panic at msg_done_handler (bnc#1012382 bsc#1088871).\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (bnc#1012382).\n- ipv4: lock mtu in fnhe when received PMTU lower than net.ipv4.route.min_pmtu (bnc#1012382).\n- ipv4: remove warning in ip_recv_error (bnc#1012382).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (bnc#1012382).\n- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- ipvs: fix rtnl_lock lockups caused by start_sync_thread (bnc#1012382).\n- irda: fix overly long udelay() (bnc#1012382).\n- irqchip/gic-v3: Change pr_debug message to pr_devel (bnc#1012382).\n- isdn: eicon: fix a missing-check bug (bnc#1012382).\n- jbd2: fix use after free in kjournald2() (bnc#1012382).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bnc#1012382).\n- jffs2: Fix use-after-free bug in jffs2_iget()\u0027s error handling path (bnc#1012382 git-fixes).\n- jffs2_kill_sb(): deal with failed allocations (bnc#1012382).\n- kABI: work around BPF SSBD removal (bsc#1087082).\n- kabi: vfs: Restore dentry_operations-\u003ed_manage (bsc#1086716).\n- kasan: fix memory hotplug during boot (bnc#1012382).\n- kconfig: Avoid format overflow warning from GCC 8.1 (bnc#1012382).\n- kconfig: Do not leak main menus during parsing (bnc#1012382).\n- kconfig: Fix automatic menu creation mem leak (bnc#1012382).\n- kconfig: Fix expr_free() E_NOT leak (bnc#1012382).\n- kdb: make \u0027mdr\u0027 command repeat (bnc#1012382).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bnc#1012382).\n- kernel/sys.c: fix potential Spectre v1 issue (bnc#1012382).\n- kernel: Fix memory leak on EP11 target list processing (bnc#1096751, ).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1044596).\n- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).\n- kobject: do not use WARN for registration failures (bnc#1012382).\n- kvm: Fix nopvspin static branch init usage (bsc#1056427).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: x86: fix KVM_XEN_HVM_CONFIG ioctl (bnc#1012382).\n- kvm: x86: use correct privilege level for sgdt/sidt/fxsave/fxrstor access (bnc#1012382).\n- l2tp: check sockaddr length in pppol2tp_connect() (bnc#1012382).\n- l2tp: revert \u0027l2tp: fix missing print session offset info\u0027 (bnc#1012382).\n- lan78xx: Correctly indicate invalid OTP (bnc#1012382).\n- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bnc#1012382).\n- libata: Blacklist some Sandisk SSDs for NCQ (bnc#1012382).\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bnc#1012382).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- libnvdimm, dax: fix 1GB-aligned namespaces vs physical misalignment\n- libnvdimm, namespace: use a safe lookup for dimm device name\n- libnvdimm, pfn: fix start_pad handling for aligned namespaces\n- livepatch: Allow to call a custom callback when freeing shadow variables (bsc#1082299).\n- livepatch: Initialize shadow variables safely by a custom callback (bsc#1082299).\n- llc: better deal with too small mtu (bnc#1012382).\n- llc: delete timers synchronously in llc_sk_free() (bnc#1012382).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (bnc#1012382).\n- llc: hold llc_sap before release_sock() (bnc#1012382).\n- llc: properly handle dev_queue_xmit() return value (bnc#1012382).\n- lockd: lost rollback of set_grace_period() in lockd_down_net() (bnc#1012382 git-fixes).\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bnc#1012382).\n- locking/xchg/alpha: Add unconditional memory barrier to cmpxchg() (bnc#1012382).\n- locking/xchg/alpha: Fix xchg() and cmpxchg() memory ordering bugs (bnc#1012382).\n- loop: handle short DIO reads (bsc#1094177).\n- m68k: set dma and coherent masks for platform FEC ethernets (bnc#1012382).\n- mac80211: Add RX flag to indicate ICV stripped (bnc#1012382).\n- mac80211: allow not sending MIC up from driver for HW crypto (bnc#1012382).\n- mac80211: allow same PN for AMSDU sub-frames (bnc#1012382).\n- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bnc#1012382).\n- md raid10: fix NULL deference in handle_write_completed() (bnc#1012382 bsc#1056415).\n- md/raid1: fix NULL pointer dereference (bnc#1012382).\n- md: document lifetime of internal rdev pointer (bsc#1056415).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1089023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1056415).\n- md: raid5: avoid string overflow warning (bnc#1012382).\n- media: cx23885: Override 888 ImpactVCBe crystal frequency (bnc#1012382).\n- media: cx23885: Set subdev host data to clk_freq pointer (bnc#1012382).\n- media: cx25821: prevent out-of-bounds read on array card (bnc#1012382 bsc#1031717).\n- media: dmxdev: fix error code for invalid ioctls (bnc#1012382).\n- media: em28xx: USB bulk packet size fix (bnc#1012382).\n- media: s3c-camif: fix out-of-bounds array access (bnc#1012382 bsc#1031717).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bnc#1012382).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mm, slab: reschedule cache_reap() on the same CPU (bnc#1012382).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bnc#1012382).\n- mm/kmemleak.c: wait for scan completion before disabling free (bnc#1012382).\n- mm/ksm: fix interaction with THP (bnc#1012382).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (bnc#1012382).\n- mm/mempolicy: add nodes_empty check in SYSC_migrate_pages (bnc#1012382).\n- mm/mempolicy: fix the check of nodemask from user (bnc#1012382).\n- mm: do not allow deferred pages with NEED_PER_CPU_KM (bnc#1012382).\n- mm: filemap: avoid unnecessary calls to lock_page when waiting for IO to complete during a read (-- VM bnc#1012382 bnc#971975 generic performance read).\n- mm: filemap: remove redundant code in do_read_cache_page (-- VM bnc#1012382 bnc#971975 generic performance read).\n- mm: fix races between address_space dereference and free in page_evicatable (bnc#1012382).\n- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#1012382).\n- mm: pin address_space before dereferencing it while isolating an LRU page (bnc#1012382 bnc#1081500).\n- mmap: introduce sane default mmap limits (bnc#1012382).\n- mmap: relax file size limit for regular files (bnc#1012382).\n- mmc: jz4740: Fix race condition in IRQ mask update (bnc#1012382).\n- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bnc#1012382).\n- mtd: cfi: cmdset_0001: Do not allow read/write to suspend erase block (bnc#1012382).\n- mtd: cfi: cmdset_0001: Workaround Micron Erase suspend bug (bnc#1012382).\n- mtd: cfi: cmdset_0002: Do not allow read/write to suspend erase block (bnc#1012382).\n- net-usb: add qmi_wwan if on lte modem wistron neweb d18q1 (bnc#1012382).\n- net/mlx4: Fix irq-unsafe spinlock usage (bnc#1012382).\n- net/mlx4_en: Verify coalescing parameters are in range (bnc#1012382).\n- net/mlx5: Protect from command bit overflow (bnc#1012382).\n- net/packet: refine check for priv area size (bnc#1012382).\n- net/tcp/illinois: replace broken algorithm reference link (bnc#1012382).\n- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bnc#1012382).\n- net: Fix untag for vlan packets without ethernet header (bnc#1012382).\n- net: Fix vlan untag for bridge and vlan_dev with reorder_hdr off (bnc#1012382).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (bnc#1012382).\n- net: atm: Fix potential Spectre v1 (bnc#1012382).\n- net: bgmac: Fix endian access in bgmac_dma_tx_ring_free() (bnc#1012382).\n- net: ethernet: sun: niu set correct packet size in skb (bnc#1012382).\n- net: fix deadlock while clearing neighbor proxy table (bnc#1012382).\n- net: fix rtnh_ok() (bnc#1012382).\n- net: fix uninit-value in __hw_addr_add_ex() (bnc#1012382).\n- net: initialize skb-\u003epeeked when cloning (bnc#1012382).\n- net: metrics: add proper netlink validation (bnc#1012382).\n- net: mvneta: fix enable of all initialized RXQs (bnc#1012382).\n- net: phy: broadcom: Fix bcm_write_exp() (bnc#1012382).\n- net: qmi_wwan: add BroadMobi BM806U 2020:2033 (bnc#1012382).\n- net: support compat 64-bit time in {s,g}etsockopt (bnc#1012382).\n- net: test tailroom before appending to linear skb (bnc#1012382).\n- net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (bnc#1012382).\n- net: validate attribute sizes in neigh_dump_table() (bnc#1012382).\n- net_sched: fq: take care of throttled flows before reuse (bnc#1012382).\n- netdev-FAQ: clarify DaveM\u0027s position for stable backports (bnc#1012382).\n- netfilter: ebtables: convert BUG_ONs to WARN_ONs (bnc#1012382).\n- netlabel: If PF_INET6, check sk_buff ip header version (bnc#1012382).\n- netlink: fix uninit-value in netlink_sendmsg (bnc#1012382).\n- nfit, address-range-scrub: fix scrub in-progress reporting\n- nfit: fix region registration vs block-data-window ranges\n- nfs: Do not convert nfs_idmap_cache_timeout to jiffies (bnc#1012382 git-fixes).\n- ntb_transport: Fix bug with max_mw_size parameter (bnc#1012382).\n- nvme-pci: Fix EEH failure on ppc (bsc#1093533).\n- nvme-pci: Fix nvme queue cleanup if IRQ setup fails (bnc#1012382).\n- nvme: target: fix buffer overflow (bsc#993388).\n- ocfs2/acl: use \u0027ip_xattr_sem\u0027 to protect getting extended attribute (bnc#1012382).\n- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1070404).\n- ocfs2/dlm: do not handle migrate lockres if already in shutdown (bnc#1012382).\n- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1070404).\n- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bnc#1012382).\n- ocfs2: return error when we attempt to access a dirty bh in jbd2 (bnc#1012382 bsc#1070404).\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (bnc#1012382).\n- packet: fix bitfield update race (bnc#1012382).\n- packet: fix reserve calculation (bnc#1012382 git-fixes).\n- packet: fix reserve calculation (git-fixes).\n- packet: in packet_snd start writing at link layer allocation (bnc#1012382).\n- parisc/pci: Switch LBA PCI bus from Hard Fail to Soft Fail mode (bnc#1012382).\n- parisc: Fix out of array access in match_pci_device() (bnc#1012382).\n- percpu: include linux/sched.h for cond_resched() (bnc#1012382).\n- perf callchain: Fix attr.sample_max_stack setting (bnc#1012382).\n- perf intel-pt: Fix error recovery from missing TIP packet (bnc#1012382).\n- perf intel-pt: Fix overlap detection to identify consecutive buffers correctly (bnc#1012382).\n- perf intel-pt: Fix sync_switch (bnc#1012382).\n- perf intel-pt: Fix timestamp following overflow (bnc#1012382).\n- perf report: Fix memory corruption in --branch-history mode --branch-history (bnc#1012382).\n- perf tests: Use arch__compare_symbol_names to compare symbols (bnc#1012382).\n- perf/cgroup: Fix child event counting bug (bnc#1012382).\n- perf/core: Fix perf_output_read_group() (bnc#1012382).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages[] (bnc#1012382).\n- perf/core: Fix the perf_cpu_time_max_percent check (bnc#1012382).\n- perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr (bnc#1012382).\n- perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver (bnc#1012382).\n- perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_* (bnc#1012382).\n- perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map() (bnc#1012382).\n- perf: Remove superfluous allocation error check (bnc#1012382).\n- perf: Return proper values for user stack errors (bnc#1012382).\n- pipe: cap initial pipe capacity according to pipe-max-size limit (bnc#1012382 bsc#1045330).\n- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).\n- powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382).\n- powerpc/64: Use barrier_nospec in syscall entry (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add barrier_nospec (bsc#1068032, bsc#1080157).\n- powerpc/64s: Add support for ori barrier_nospec patching (bsc#1068032, bsc#1080157).\n- powerpc/64s: Clear PCR on boot (bnc#1012382).\n- powerpc/64s: Enable barrier_nospec based on firmware settings (bsc#1068032, bsc#1080157).\n- powerpc/64s: Enhance the information in cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Enhance the information in cpu_show_spectre_v1() (bsc#1068032).\n- powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Move cpu_show_meltdown() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Patch barrier_nospec in modules (bsc#1068032, bsc#1080157).\n- powerpc/64s: Wire up cpu_show_spectre_v1() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/64s: Wire up cpu_show_spectre_v2() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/bpf/jit: Fix 32-bit JIT for seccomp_data access (bnc#1012382).\n- powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).\n- powerpc/lib: Fix off-by-one in alternate feature patching (bnc#1012382).\n- powerpc/livepatch: Fix livepatch stack access (bsc#1094466).\n- powerpc/mm: Allow memory hotplug into an offline node (bsc#1090663).\n- powerpc/mm: allow memory hotplug into a memoryless node (bsc#1090663).\n- powerpc/modules: Do not try to restore r2 after a sibling call (bsc#1094466).\n- powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382).\n- powerpc/numa: Ensure nodes initialized for hotplug (bnc#1012382 bsc#1081514).\n- powerpc/numa: Use ibm,max-associativity-domains to discover possible nodes (bnc#1012382 bsc#1081514).\n- powerpc/perf: Fix kernel address leak via sampling registers (bnc#1012382).\n- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bnc#1012382).\n- powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382).\n- powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382).\n- powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382).\n- powerpc/powernv: Remove OPALv2 firmware define and references (bnc#1012382).\n- powerpc/powernv: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: Use the security flags in pnv_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382).\n- powerpc/powernv: panic() on OPAL lower than V3 (bnc#1012382).\n- powerpc/powernv: remove FW_FEATURE_OPALv3 and just use FW_FEATURE_OPAL (bnc#1012382).\n- powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Fix clearing of security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Restore default security feature flags on setup (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Set or clear security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/pseries: Use the security flags in pseries_setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Always enable fallback flush on pseries (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Differentiate enabled and patched flush types (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again (bsc#1068032, bsc#1075087, bsc#1091041). \n- powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382).\n- powerpc: Add security feature flags for Spectre/Meltdown (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Do not preempt_disable() in show_cpuinfo() (bnc#1012382 bsc#1066223).\n- powerpc: Move default security feature flags (bsc#1068032, bsc#1075087, bsc#1091041).\n- powerpc: Use barrier_nospec in copy_from_user() (bsc#1068032, bsc#1080157).\n- powerpc: conditionally compile platform-specific serial drivers (bsc#1066223).\n- powerpc: signals: Discard transaction state from signal frames (bsc#1094059).\n- pppoe: check sockaddr length in pppoe_connect() (bnc#1012382).\n- proc read mm\u0027s {arg,env}_{start,end} with mmap semaphore taken (bnc#1012382).\n- proc: fix /proc/*/map_files lookup (bnc#1012382).\n- proc: meminfo: estimate available memory more conservatively (-- VM bnc#1012382 functionality monitoring space user).\n- procfs: fix pthread cross-thread naming if !PR_DUMPABLE (bnc#1012382).\n- qed: Fix LL2 race during connection terminate (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: Fix mask for physical address in ILT entry (bnc#1012382).\n- qed: Fix possibility of list corruption during rmmod flows (bsc#1019695 bsc#1019699 bsc#1022604).\n- qed: LL2 flush isles when connection is closed (bsc#1019695 bsc#1019699 bsc#1022604).\n- qede: Fix ref-cnt usage count (bsc#1019695 bsc#1019699 bsc#1022604).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- qmi_wwan: do not steal interfaces from class drivers (bnc#1012382).\n- r8152: add Linksys USB3GIGV1 id (bnc#1012382).\n- r8152: fix tx packets accounting (bnc#1012382).\n- r8169: fix powering up RTL8168h (bnc#1012382).\n- radeon: hide pointless #warning when compile testing (bnc#1012382).\n- random: use a tighter cap in credit_entropy_bits_safe() (bnc#1012382).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bnc#1012382).\n- regulatory: add NUL to request alpha2 (bnc#1012382).\n- resource: fix integer overflow at reallocation (bnc#1012382).\n- rfkill: gpio: fix memory leak in probe error path (bnc#1012382).\n- rpc_pipefs: fix double-dput() (bnc#1012382).\n- rpm/config.sh: build against SP3 in OBS as well.\n- rtc: hctosys: Ensure system time does not overflow time_t (bnc#1012382).\n- rtc: snvs: Fix usage of snvs_rtc_enable (bnc#1012382).\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bnc#1012382).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bnc#1012382).\n- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bnc#1012382).\n- rtnetlink: validate attributes in do_setlink() (bnc#1012382).\n- s390/alternative: use a copy of the facility bit mask (bnc#1012382).\n- s390/cio: clear timer when terminating driver I/O (bnc#1012382).\n- s390/cio: fix return code after missing interrupt (bnc#1012382).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1012382).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero ( bnc#1012382 bnc#1094532).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1094532, ).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093144, ).\n- s390/entry.S: fix spurious zeroing of r0 (bnc#1012382).\n- s390/ftrace: use expoline for indirect branches (bnc#1012382).\n- s390/ipl: ensure loadparm valid flag is set (bnc#1012382).\n- s390/kernel: use expoline for indirect branches (bnc#1012382).\n- s390/lib: use expoline for indirect branches (bnc#1012382).\n- s390/qdio: do not merge ERROR output buffers (bnc#1012382).\n- s390/qdio: do not release memory in qdio_setup_irq() (bnc#1012382).\n- s390/qdio: do not retry EQBS after CCQ 96 (bnc#1012382).\n- s390/qdio: fix access to uninitialized qdio_q fields ( bnc#1012382 bnc#1094532).\n- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1094532, ).\n- s390/qeth: consolidate errno translation (bnc#1093144, ).\n- s390/qeth: fix MAC address update sequence (bnc#1093144, ).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093144, ).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1012382).\n- s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) (bnc#1012382).\n- s390: add assembler macros for CPU alternatives (bnc#1012382).\n- s390: add automatic detection of the spectre defense (bnc#1012382).\n- s390: add optimized array_index_mask_nospec (bnc#1012382).\n- s390: add options to change branch prediction behaviour for the kernel (bnc#1012382 bsc#1068032).\n- s390: add sysfs attributes for spectre (bnc#1012382).\n- s390: correct module section names for expoline code revert (bnc#1012382).\n- s390: correct nospec auto detection init order (bnc#1012382).\n- s390: do not bypass BPENTER for interrupt system calls (bnc#1012382).\n- s390: enable CPU alternatives unconditionally (bnc#1012382).\n- s390: extend expoline to BC instructions (bnc#1012382).\n- s390: introduce execute-trampolines for branches (bnc#1012382).\n- s390: move expoline assembler macros to a header (bnc#1012382).\n- s390: move nobp parameter functions to nospec-branch.c (bnc#1012382).\n- s390: move spectre sysfs attribute code (bnc#1012382).\n- s390: remove indirect branch from do_softirq_own_stack (bnc#1012382).\n- s390: report spectre mitigation via syslog (bnc#1012382).\n- s390: run user space and KVM guests with modified branch prediction (bnc#1012382).\n- s390: scrub registers on kernel entry and KVM exit (bnc#1012382).\n- s390: use expoline thunks in the BPF JIT (bnc#1012382).\n- sched/rt: Fix rq-\u003eclock_update_flags lower than RQCF_ACT_SKIP warning (bnc#1012382).\n- scsi: aacraid: Correct hba_send to include iu_type (bsc#1022607).\n- scsi: aacraid: Insure command thread is not recursively stopped (bnc#1012382).\n- scsi: aacraid: fix shutdown crash when init fails (bnc#1012382).\n- scsi: bnx2fc: Fix check in SCSI completion handler for timed out request (bnc#1012382).\n- scsi: fas216: fix sense buffer initialization (bnc#1012382 bsc#1082979).\n- scsi: libsas: defer ata device eh commands to libata (bnc#1012382).\n- scsi: lpfc: Fix frequency of Release WQE CQEs (bnc#1012382).\n- scsi: lpfc: Fix issue_lip if link is disabled (bnc#1012382 bsc#1080656).\n- scsi: lpfc: Fix soft lockup in lpfc worker thread during LIP testing (bnc#1012382 bsc#1080656).\n- scsi: mpt3sas: Do not mark fw_event workqueue as WQ_MEM_RECLAIM (bnc#1012382 bsc#1078583).\n- scsi: mptfusion: Add bounds check in mptctl_hp_targetinfo() (bnc#1012382).\n- scsi: mptsas: Disable WRITE SAME (bnc#1012382).\n- scsi: qla2xxx: Avoid triggering undefined behavior in qla2x00_mbx_completion() (bnc#1012382).\n- scsi: qla4xxx: skip error recovery in case of register disconnect (bnc#1012382).\n- scsi: scsi_transport_srp: Fix shost to rport translation (bnc#1012382).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (bnc#1012382).\n- scsi: sd: Keep disk read-only when re-reading partition (bnc#1012382).\n- scsi: sg: allocate with __GFP_ZERO in sg_build_indirect() (bnc#1012382).\n- scsi: storvsc: Increase cmd_per_lun for higher speed devices (bnc#1012382).\n- scsi: sym53c8xx_2: iterator underflow in sym_getsync() (bnc#1012382).\n- scsi: ufs: Enable quirk to ignore sending WRITE_SAME command (bnc#1012382).\n- scsi: zfcp: fix infinite iteration on ERP ready list ( bnc#1012382 bnc#1094532).\n- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1094532, ).\n- sctp: delay the authentication for the duplicated cookie-echo chunk (bnc#1012382).\n- sctp: do not check port in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (bnc#1012382).\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (bnc#1012382).\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (bnc#1012382).\n- selftests/net: fixes psock_fanout eBPF test case (bnc#1012382).\n- selftests/powerpc: Skip the subpage_prot tests if the syscall is unavailable (bnc#1012382).\n- selftests: Print the test we\u0027re running to /dev/kmsg (bnc#1012382).\n- selftests: ftrace: Add a testcase for probepoint (bnc#1012382).\n- selftests: ftrace: Add a testcase for string type with kprobe_event (bnc#1012382).\n- selftests: ftrace: Add probe event argument syntax testcase (bnc#1012382).\n- selftests: memfd: add config fragment for fuse (bnc#1012382).\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bnc#1012382).\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bnc#1012382).\n- serial: imx: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: mctrl_gpio: Add missing module license (bnc#1012382).\n- serial: mctrl_gpio: export mctrl_gpio_disable_ms and mctrl_gpio_init (bnc#1012382).\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: samsung: Fix out-of-bounds access through serial port index (bnc#1012382).\n- serial: samsung: fix maxburst parameter for DMA transactions (bnc#1012382).\n- serial: xuartps: Fix out-of-bounds access through DT alias (bnc#1012382).\n- sh: New gcc support (bnc#1012382).\n- sh: fix debug trap failure to process signals before return to user (bnc#1012382).\n- signals: avoid unnecessary taking of sighand-\u003esiglock (-- Scheduler bnc#1012382 bnc#978907 performance signals).\n- sit: fix IFLA_MTU ignored on NEWLINK (bnc#1012382).\n- slip: Check if rstate is initialized before uncompressing (bnc#1012382).\n- smsc75xx: fix smsc75xx_set_features() (bnc#1012382).\n- sock_diag: fix use-after-free read in __sk_free (bnc#1012382).\n- soreuseport: initialise timewait reuseport field (bnc#1012382).\n- sparc64: Fix build warnings with gcc 7 (bnc#1012382).\n- sparc64: Make atomic_xchg() an inline function rather than a macro (bnc#1012382).\n- spi: pxa2xx: Allow 64-bit DMA (bnc#1012382).\n- sr: get/drop reference to device in revalidate and check_events (bnc#1012382).\n- staging: ion : Donnot wakeup kswapd in ion system alloc (bnc#1012382).\n- staging: rtl8192u: return -ENOMEM on failed allocation of priv-\u003eoldaddr (bnc#1012382).\n- stm class: Use vmalloc for the master map (bnc#1012382).\n- stop_machine, sched: Fix migrate_swap() vs. active_balance() deadlock (bsc#1088810).\n- sunvnet: does not support GSO for sctp (bnc#1012382).\n- swap: divide-by-zero when zero length swap file on ssd (bnc#1012382 bsc#1082153).\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1082153).\n- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).\n- tcp: avoid integer overflows in tcp_rcv_space_adjust() (bnc#1012382).\n- tcp: do not read out-of-bounds opsize (bnc#1012382).\n- tcp: fix TCP_REPAIR_QUEUE bound checking (bnc#1012382).\n- tcp: ignore Fast Open on repair mode (bnc#1012382).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (bnc#1012382).\n- tcp: purge write queue in tcp_connect_init() (bnc#1012382).\n- team: avoid adding twice the same option to the event list (bnc#1012382).\n- team: fix netconsole setup over team (bnc#1012382).\n- team: use netdev_features_t instead of u32 (bnc#1012382).\n- test_bpf: Fix testing with CONFIG_BPF_JIT_ALWAYS_ON=y on other arches (git-fixes).\n- test_firmware: fix setting old custom fw path back on exit, second try (bnc#1012382).\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bnc#1012382).\n- there is probably a place where forcing _IBRS_OFF is missed (or is too late) and therefore ENABLE_IBRS is sometimes called early during boot while it should not. Let\u0027s drop the uoptimization for now. Fixes bsc#1098009 and bsc#1098012\n- thermal: imx: Fix race condition in imx_thermal_probe() (bnc#1012382).\n- thunderbolt: Resume control channel after hibernation image is created (bnc#1012382).\n- tick/broadcast: Use for_each_cpu() specially on UP kernels (bnc#1012382).\n- time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting (bnc#1012382).\n- tipc: add policy for TIPC_NLA_NET_ADDR (bnc#1012382).\n- tools lib traceevent: Fix get_field_str() for dynamic strings (bnc#1012382).\n- tools lib traceevent: Simplify pointer print logic and fix %pF (bnc#1012382).\n- tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bnc#1012382).\n- tools/thermal: tmon: fix for segfault (bnc#1012382).\n- tpm: do not suspend/resume if power stays on (bnc#1012382).\n- tpm: self test failure should not cause suspend to fail (bnc#1012382).\n- tracepoint: Do not warn on ENOMEM (bnc#1012382).\n- tracing/hrtimer: Fix tracing bugs by taking all clock bases and modes into account (bnc#1012382).\n- tracing/uprobe_event: Fix strncpy corner case (bnc#1012382).\n- tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all} (bnc#1012382).\n- tracing: Fix crash when freeing instances with event triggers (bnc#1012382).\n- tracing: Fix regex_match_front() to not over compare the test string (bnc#1012382).\n- tty: Do not call panic() at tty_ldisc_init() (bnc#1012382).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bnc#1012382).\n- tty: make n_tty_read() always abort if hangup is in progress (bnc#1012382).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bnc#1012382).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bnc#1012382).\n- ubi: Fix error for write access (bnc#1012382).\n- ubi: Reject MLC NAND (bnc#1012382).\n- ubi: fastmap: Do not flush fastmap work on detach (bnc#1012382).\n- ubifs: Check ubifs_wbuf_sync() return code (bnc#1012382).\n- udf: Provide saner default for invalid uid / gid (bnc#1012382).\n- um: Use POSIX ucontext_t instead of struct ucontext (bnc#1012382).\n- usb: core: Add quirk for HP v222w 16GB Mini (bnc#1012382).\n- usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bnc#1012382).\n- usb: dwc2: Fix interval type issue (bnc#1012382).\n- usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bnc#1012382).\n- usb: dwc3: pci: Properly cleanup resource (bnc#1012382).\n- usb: gadget: composite: fix incorrect handling of OS desc requests (bnc#1012382).\n- usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bnc#1012382).\n- usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bnc#1012382).\n- usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bnc#1012382).\n- usb: gadget: fsl_udc_core: fix ep valid checks (bnc#1012382).\n- usb: gadget: udc: change comparison to bitshift when dealing with a mask (bnc#1012382).\n- usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bnc#1012382).\n- usb: musb: fix enumeration after resume (bnc#1012382).\n- usb: musb: gadget: misplaced out of bounds check (bnc#1012382).\n- usb: musb: host: fix potential NULL pointer dereference (bnc#1012382).\n- usbip: usbip_host: delete device from busid_table after rebind (bnc#1012382).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bnc#1012382).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bnc#1012382).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bnc#1012382).\n- usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bnc#1012382).\n- usbip: usbip_host: run rebind from exit when module is removed (bnc#1012382).\n- usbip: vhci_hcd: Fix usb device and sockfd leaks (bnc#1012382).\n- vfio-pci: Virtualize PCIe and AF FLR (bnc#1012382).\n- vfio/pci: Virtualize Maximum Payload Size (bnc#1012382).\n- vfio/pci: Virtualize Maximum Read Request Size (bnc#1012382).\n- vfs: add path_has_submounts() (bsc#1086716).\n- vfs: add path_is_mountpoint() helper (bsc#1086716).\n- vfs: change d_manage() to take a struct path (bsc#1086716).\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bnc#1012382).\n- virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bnc#1012382).\n- virtio: add ability to iterate over vqs (bnc#1012382).\n- virtio_console: free buffers after reset (bnc#1012382).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (bnc#1012382).\n- vmscan: do not force-scan file lru if its absolute size is small (-- VM bnc#1012382 page performance reclaim).\n- vmw_balloon: fixing double free when batching mode is off (bnc#1012382).\n- vti4: Do not count header length twice on tunnel setup (bnc#1012382).\n- vti4: Do not override MTU passed on link creation via IFLA_MTU (bnc#1012382).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bnc#1012382).\n- watchdog: f71808e_wdt: Fix magic close handling (bnc#1012382).\n- watchdog: hpwdt: Modify to use watchdog core (bsc#1085185).\n- watchdog: hpwdt: Update Module info and copyright (bsc#1085185).\n- watchdog: hpwdt: Update nmi_panic message (bsc#1085185).\n- watchdog: hpwdt: condition early return of NMI handler on iLO5 (bsc#1085185).\n- watchdog: sp5100_tco: Fix watchdog disable bit (bnc#1012382).\n- workqueue: use put_device() instead of kfree() (bnc#1012382).\n- writeback: safer lock nesting (bnc#1012382).\n- x86/apic: Set up through-local-APIC mode on the boot CPU if \u0027noapic\u0027 specified (bnc#1012382).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).\n- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1068032).\n- x86/bugs: Make sure that _TIF_SSBD does not end up in _TIF_ALLWORK_MASK (bsc#1093215).\n- x86/bugs: Respect retpoline command line option (bsc#1068032).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: make intel_rds_mask() honor X86_FEATURE_SSBD (bsc#1094019).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros (bnc#1012382).\n- x86/crypto, x86/fpu: Remove X86_FEATURE_EAGER_FPU #ifdef from the crc32c code (bnc#1012382).\n- x86/devicetree: Fix device IRQ settings in DT (bnc#1012382).\n- x86/devicetree: Initialize device tree before using it (bnc#1012382).\n- x86/fpu: Disable AVX when eagerfpu is off (bnc#1012382).\n- x86/fpu: Hard-disable lazy FPU mode (bnc#1012382).\n- x86/fpu: Revert (\u0027x86/fpu: Disable AVX when eagerfpu is off\u0027) (bnc#1012382).\n- x86/hweight: Do not clobber %rdi (bnc#1012382).\n- x86/hweight: Get rid of the special calling convention (bnc#1012382).\n- x86/ipc: Fix x32 version of shmid64_ds and msqid64_ds (bnc#1012382).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)\n- x86/kexec: Avoid double free_page() upon do_kexec_load() failure (bnc#1012382).\n- x86/pgtable: Do not set huge PUD/PMD on non-leaf entries (bnc#1012382).\n- x86/pkeys: Do not special case protection key 0 (1041740).\n- x86/pkeys: Override pkey when moving away from PROT_EXEC (1041740).\n- x86/platform/UV: Add references to access fixed UV4A HUB MMRs (bsc#1076263).\n- x86/platform/UV: Fix GAM MMR changes in UV4A (bsc#1076263).\n- x86/platform/UV: Fix GAM MMR references in the UV x2apic code (bsc#1076263).\n- x86/platform/UV: Fix GAM Range Table entries less than 1GB (bsc#1091325).\n- x86/platform/UV: Fix UV4A BAU MMRs (bsc#1076263).\n- x86/platform/UV: Fix UV4A support on new Intel Processors (bsc#1076263).\n- x86/platform/UV: Fix critical UV MMR address error (bsc#1076263\n- x86/platform/UV: Update uv_mmrs.h to prepare for UV4A fixes (bsc#1076263).\n- x86/platform/uv/BAU: Replace hard-coded values with MMR definitions (bsc#1076263).\n- x86/power: Fix swsusp_arch_resume prototype (bnc#1012382).\n- x86/smpboot: Do not use mwait_play_dead() on AMD systems (bnc#1012382).\n- x86/topology: Update the \u0027cpu cores\u0027 field in /proc/cpuinfo correctly across CPU hotplug operations (bnc#1012382).\n- x86/tsc: Prevent 32bit truncation in calc_hpet_ref() (bnc#1012382).\n- x86: Remove unused function cpu_has_ht_siblings() (bnc#1012382).\n- xen-netfront: Fix hang on device removal (bnc#1012382).\n- xen-netfront: Fix race between device setup and open (bnc#1012382).\n- xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1012382).\n- xen/acpi: off by one in read_acpi_id() (bnc#1012382).\n- xen/grant-table: Use put_page instead of free_page (bnc#1012382).\n- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).\n- xen/pirq: fix error path cleanup when binding MSIs (bnc#1012382).\n- xen: xenbus: use put_device() instead of kfree() (bnc#1012382).\n- xfrm: fix xfrm_do_migrate() with AEAD e.g(AES-GCM) (bnc#1012382).\n- xfrm_user: fix return value from xfrm_user_rcv_msg (bnc#1012382).\n- xfs: always verify the log tail during recovery (bsc#1036215).\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bnc#1012382 bsc#1090534 bsc#1090955).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: detect and handle invalid iclog size set by mkfs (bsc#1043598).\n- xfs: detect and trim torn writes during log recovery (bsc#1036215).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n- xfs: fix endianness error when checking log block crc on big endian platforms (bsc#1094405, bsc#1036215).\n- xfs: fix incorrect log_flushed on fsync (bnc#1012382).\n- xfs: fix log recovery corruption error due to tail overwrite (bsc#1036215).\n- xfs: fix recovery failure when log record header wraps log end (bsc#1036215).\n- xfs: handle -EFSCORRUPTED during head/tail verification (bsc#1036215).\n- xfs: prevent creating negative-sized file via INSERT_RANGE (bnc#1012382).\n- xfs: refactor and open code log record crc check (bsc#1036215).\n- xfs: refactor log record start detection into a new helper (bsc#1036215).\n- xfs: remove racy hasattr check from attr ops (bnc#1012382 bsc#1035432).\n- xfs: return start block of first bad log record during recovery (bsc#1036215).\n- xfs: support a crc verification only log record pass (bsc#1036215).\n- xhci: Fix USB3 NULL pointer dereference at logical disconnect (git-fixes).\n- xhci: Fix use-after-free in xhci_free_virt_device (git-fixes).\n- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bnc#1012382).\n- zorro: Set up z-\u003edev.dma_mask for the DMA API (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP3-2018-1224", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1816-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1816-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1816-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004219.html" }, { "category": "self", "summary": "SUSE Bug 1009062", "url": "https://bugzilla.suse.com/1009062" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1019695", "url": "https://bugzilla.suse.com/1019695" }, { "category": "self", "summary": "SUSE Bug 1019699", "url": "https://bugzilla.suse.com/1019699" }, { "category": "self", "summary": "SUSE Bug 1022604", "url": "https://bugzilla.suse.com/1022604" }, { "category": "self", "summary": "SUSE Bug 1022607", "url": "https://bugzilla.suse.com/1022607" }, { "category": "self", "summary": "SUSE Bug 1022743", "url": "https://bugzilla.suse.com/1022743" }, { "category": "self", "summary": "SUSE Bug 1024718", "url": "https://bugzilla.suse.com/1024718" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1035432", "url": "https://bugzilla.suse.com/1035432" }, { "category": "self", "summary": "SUSE Bug 1036215", "url": "https://bugzilla.suse.com/1036215" }, { "category": "self", "summary": "SUSE Bug 1041740", "url": "https://bugzilla.suse.com/1041740" }, { "category": "self", "summary": "SUSE Bug 1043598", "url": "https://bugzilla.suse.com/1043598" }, { "category": "self", "summary": "SUSE Bug 1044596", "url": "https://bugzilla.suse.com/1044596" }, { "category": "self", "summary": "SUSE Bug 1045330", "url": "https://bugzilla.suse.com/1045330" }, { "category": "self", "summary": "SUSE Bug 1056415", "url": "https://bugzilla.suse.com/1056415" }, { "category": "self", "summary": "SUSE Bug 1056427", "url": "https://bugzilla.suse.com/1056427" }, { "category": "self", "summary": "SUSE Bug 1060799", "url": "https://bugzilla.suse.com/1060799" }, { "category": "self", "summary": "SUSE Bug 1066223", "url": "https://bugzilla.suse.com/1066223" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1068054", "url": "https://bugzilla.suse.com/1068054" }, { "category": "self", "summary": "SUSE Bug 1068951", "url": "https://bugzilla.suse.com/1068951" }, { "category": "self", "summary": "SUSE Bug 1070404", "url": "https://bugzilla.suse.com/1070404" }, { "category": "self", "summary": "SUSE Bug 1073059", "url": "https://bugzilla.suse.com/1073059" }, { "category": "self", "summary": "SUSE Bug 1073311", "url": "https://bugzilla.suse.com/1073311" }, { "category": "self", "summary": "SUSE Bug 1075087", "url": "https://bugzilla.suse.com/1075087" }, { "category": "self", "summary": "SUSE Bug 1075428", "url": "https://bugzilla.suse.com/1075428" }, { "category": "self", "summary": "SUSE Bug 1076049", "url": "https://bugzilla.suse.com/1076049" }, { "category": "self", "summary": "SUSE Bug 1076263", "url": "https://bugzilla.suse.com/1076263" }, { "category": "self", "summary": "SUSE Bug 1076805", "url": "https://bugzilla.suse.com/1076805" }, { "category": "self", "summary": "SUSE Bug 1078583", "url": "https://bugzilla.suse.com/1078583" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1080157", "url": "https://bugzilla.suse.com/1080157" }, { "category": "self", "summary": "SUSE Bug 1080542", "url": "https://bugzilla.suse.com/1080542" }, { "category": "self", "summary": "SUSE Bug 1080656", "url": "https://bugzilla.suse.com/1080656" }, { "category": "self", "summary": "SUSE Bug 1081500", "url": "https://bugzilla.suse.com/1081500" }, { "category": "self", "summary": "SUSE Bug 1081514", "url": "https://bugzilla.suse.com/1081514" }, { "category": "self", "summary": "SUSE Bug 1081599", "url": "https://bugzilla.suse.com/1081599" }, { "category": "self", "summary": "SUSE Bug 1082153", "url": "https://bugzilla.suse.com/1082153" }, { "category": "self", "summary": "SUSE Bug 1082299", "url": "https://bugzilla.suse.com/1082299" }, { "category": "self", "summary": "SUSE Bug 1082485", "url": "https://bugzilla.suse.com/1082485" }, { "category": "self", "summary": "SUSE Bug 1082504", "url": "https://bugzilla.suse.com/1082504" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1082979", "url": "https://bugzilla.suse.com/1082979" }, { "category": "self", "summary": "SUSE Bug 1083635", "url": "https://bugzilla.suse.com/1083635" }, { "category": "self", "summary": "SUSE Bug 1083650", "url": "https://bugzilla.suse.com/1083650" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1086400", "url": "https://bugzilla.suse.com/1086400" }, { "category": "self", "summary": "SUSE Bug 1086716", "url": "https://bugzilla.suse.com/1086716" }, { "category": "self", "summary": "SUSE Bug 1087007", "url": "https://bugzilla.suse.com/1087007" }, { "category": "self", "summary": "SUSE Bug 1087012", "url": "https://bugzilla.suse.com/1087012" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087086", "url": "https://bugzilla.suse.com/1087086" }, { "category": "self", "summary": "SUSE Bug 1087095", "url": "https://bugzilla.suse.com/1087095" }, { "category": "self", "summary": "SUSE Bug 1088810", "url": "https://bugzilla.suse.com/1088810" }, { "category": "self", "summary": "SUSE Bug 1088871", "url": "https://bugzilla.suse.com/1088871" }, { "category": "self", "summary": "SUSE Bug 1089023", "url": "https://bugzilla.suse.com/1089023" }, { "category": "self", "summary": "SUSE Bug 1089115", "url": "https://bugzilla.suse.com/1089115" }, { "category": "self", "summary": "SUSE Bug 1089393", "url": "https://bugzilla.suse.com/1089393" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090225", "url": "https://bugzilla.suse.com/1090225" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1090534", "url": "https://bugzilla.suse.com/1090534" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE Bug 1090658", "url": "https://bugzilla.suse.com/1090658" }, { "category": "self", "summary": "SUSE Bug 1090663", "url": "https://bugzilla.suse.com/1090663" }, { "category": "self", "summary": "SUSE Bug 1090708", "url": "https://bugzilla.suse.com/1090708" }, { "category": "self", "summary": "SUSE Bug 1090718", "url": "https://bugzilla.suse.com/1090718" }, { "category": "self", "summary": "SUSE Bug 1090734", "url": "https://bugzilla.suse.com/1090734" }, { "category": "self", "summary": "SUSE Bug 1090953", "url": "https://bugzilla.suse.com/1090953" }, { "category": "self", "summary": "SUSE Bug 1090955", "url": "https://bugzilla.suse.com/1090955" }, { "category": "self", "summary": "SUSE Bug 1091041", "url": "https://bugzilla.suse.com/1091041" }, { "category": "self", "summary": "SUSE Bug 1091325", "url": "https://bugzilla.suse.com/1091325" }, { "category": "self", "summary": "SUSE Bug 1091594", "url": "https://bugzilla.suse.com/1091594" }, { "category": "self", "summary": "SUSE Bug 1091728", "url": "https://bugzilla.suse.com/1091728" }, { "category": "self", "summary": "SUSE Bug 1091960", "url": "https://bugzilla.suse.com/1091960" }, { "category": "self", "summary": "SUSE Bug 1092289", "url": "https://bugzilla.suse.com/1092289" }, { "category": "self", "summary": "SUSE Bug 1092497", "url": "https://bugzilla.suse.com/1092497" }, { "category": "self", "summary": "SUSE Bug 1092552", "url": "https://bugzilla.suse.com/1092552" }, { "category": "self", "summary": "SUSE Bug 1092566", "url": "https://bugzilla.suse.com/1092566" }, { "category": "self", "summary": "SUSE Bug 1092772", "url": "https://bugzilla.suse.com/1092772" }, { "category": "self", "summary": "SUSE Bug 1092813", "url": "https://bugzilla.suse.com/1092813" }, { "category": "self", "summary": "SUSE Bug 1092888", "url": "https://bugzilla.suse.com/1092888" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1092975", "url": "https://bugzilla.suse.com/1092975" }, { "category": "self", "summary": "SUSE Bug 1093008", "url": "https://bugzilla.suse.com/1093008" }, { "category": "self", "summary": "SUSE Bug 1093035", "url": "https://bugzilla.suse.com/1093035" }, { "category": "self", "summary": "SUSE Bug 1093144", "url": "https://bugzilla.suse.com/1093144" }, { "category": "self", "summary": "SUSE Bug 1093215", "url": "https://bugzilla.suse.com/1093215" }, { "category": "self", "summary": "SUSE Bug 1093533", "url": "https://bugzilla.suse.com/1093533" }, { "category": "self", "summary": "SUSE Bug 1093904", "url": "https://bugzilla.suse.com/1093904" }, { "category": "self", "summary": "SUSE Bug 1093990", "url": "https://bugzilla.suse.com/1093990" }, { "category": "self", "summary": "SUSE Bug 1094019", "url": "https://bugzilla.suse.com/1094019" }, { "category": "self", "summary": "SUSE Bug 1094033", "url": "https://bugzilla.suse.com/1094033" }, { "category": "self", "summary": "SUSE Bug 1094059", "url": "https://bugzilla.suse.com/1094059" }, { "category": "self", "summary": "SUSE Bug 1094177", "url": "https://bugzilla.suse.com/1094177" }, { "category": "self", "summary": "SUSE Bug 1094268", "url": "https://bugzilla.suse.com/1094268" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1094356", "url": "https://bugzilla.suse.com/1094356" }, { "category": "self", "summary": "SUSE Bug 1094405", "url": "https://bugzilla.suse.com/1094405" }, { "category": "self", "summary": "SUSE Bug 1094466", "url": "https://bugzilla.suse.com/1094466" }, { "category": "self", "summary": "SUSE Bug 1094532", "url": "https://bugzilla.suse.com/1094532" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1095042", "url": "https://bugzilla.suse.com/1095042" }, { "category": "self", "summary": "SUSE Bug 1095147", "url": "https://bugzilla.suse.com/1095147" }, { "category": "self", "summary": "SUSE Bug 1096037", "url": "https://bugzilla.suse.com/1096037" }, { "category": "self", "summary": "SUSE Bug 1096140", "url": "https://bugzilla.suse.com/1096140" }, { "category": "self", "summary": "SUSE Bug 1096214", "url": "https://bugzilla.suse.com/1096214" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1096751", "url": "https://bugzilla.suse.com/1096751" }, { "category": "self", "summary": "SUSE Bug 1096982", "url": "https://bugzilla.suse.com/1096982" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE Bug 1098009", "url": "https://bugzilla.suse.com/1098009" }, { "category": "self", "summary": "SUSE Bug 1098012", "url": "https://bugzilla.suse.com/1098012" }, { "category": "self", "summary": "SUSE Bug 919144", "url": "https://bugzilla.suse.com/919144" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 978907", "url": "https://bugzilla.suse.com/978907" }, { "category": "self", "summary": "SUSE Bug 993388", "url": "https://bugzilla.suse.com/993388" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17741 page", "url": "https://www.suse.com/security/cve/CVE-2017-17741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18241 page", "url": "https://www.suse.com/security/cve/CVE-2017-18241/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1065 page", "url": "https://www.suse.com/security/cve/CVE-2018-1065/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1092 page", "url": "https://www.suse.com/security/cve/CVE-2018-1092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1093 page", "url": "https://www.suse.com/security/cve/CVE-2018-1093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1094 page", "url": "https://www.suse.com/security/cve/CVE-2018-1094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-06-26T11:39:16Z", "generator": { "date": "2018-06-26T11:39:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1816-1", "initial_release_date": "2018-06-26T11:39:16Z", "revision_history": [ { "date": "2018-06-26T11:39:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.4.138-3.14.1.noarch", "product": { "name": "kernel-devel-rt-4.4.138-3.14.1.noarch", "product_id": "kernel-devel-rt-4.4.138-3.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.4.138-3.14.1.noarch", "product": { "name": "kernel-source-rt-4.4.138-3.14.1.noarch", "product_id": "kernel-source-rt-4.4.138-3.14.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "dlm-kmp-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt-base-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt-base-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt-devel-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt-devel-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "product_id": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.4.138-3.14.1.x86_64", "product": { "name": "kernel-syms-rt-4.4.138-3.14.1.x86_64", "product_id": "kernel-syms-rt-4.4.138-3.14.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64", "product_id": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.4.138-3.14.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch" }, "product_reference": "kernel-devel-rt-4.4.138-3.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt-base-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt-devel-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.4.138-3.14.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch" }, "product_reference": "kernel-source-rt-4.4.138-3.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "kernel-syms-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.4.138-3.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2017-17741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17741" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17741", "url": "https://www.suse.com/security/cve/CVE-2017-17741" }, { "category": "external", "summary": "SUSE Bug 1073311 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1073311" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-17741", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "important" } ], "title": "CVE-2017-17741" }, { "cve": "CVE-2017-18241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18241" } ], "notes": [ { "category": "general", "text": "fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18241", "url": "https://www.suse.com/security/cve/CVE-2017-18241" }, { "category": "external", "summary": "SUSE Bug 1086400 for CVE-2017-18241", "url": "https://bugzilla.suse.com/1086400" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-1065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1065" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1065", "url": "https://www.suse.com/security/cve/CVE-2018-1065" }, { "category": "external", "summary": "SUSE Bug 1083650 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1083650" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1092" } ], "notes": [ { "category": "general", "text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1092", "url": "https://www.suse.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "SUSE Bug 1087012 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087012" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1093" } ], "notes": [ { "category": "general", "text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1093", "url": "https://www.suse.com/security/cve/CVE-2018-1093" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087095 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087095" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1094" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1094", "url": "https://www.suse.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "SUSE Bug 1087007 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087007" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1094" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "important" } ], "title": "CVE-2018-5848" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "moderate" } ], "title": "CVE-2018-7492" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.138-3.14.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.138-3.14.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.138-3.14.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-26T11:39:16Z", "details": "important" } ], "title": "CVE-2018-8781" } ] }
suse-su-2018:2092-1
Vulnerability from csaf_suse
Published
2018-07-27 13:37
Modified
2018-07-27 13:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following new feature was added:
- NVDIMM memory error notification (ACPI 6.2)
The following security bugs were fixed:
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could
have result in local attackers being able to crash the kernel or potentially
elevate privileges because kmalloc_array is not used (bnc#1100418)
- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a
large relative timeout because ktime_add_safe was not used (bnc#1099924)
- CVE-2018-9385: Prevent overread of the 'driver_override' buffer (bsc#1100491)
- CVE-2018-13405: The inode_init_owner function allowed local users to create
files with an unintended group ownership allowing attackers to escalate
privileges by making a plain file executable and SGID (bnc#1100416)
- CVE-2017-5753: Systems with microprocessors utilizing speculative execution
and branch prediction may have allowed unauthorized disclosure of information
to an attacker with local user access via a side-channel analysis (bsc#1068032)
- CVE-2018-1118: Linux kernel vhost did not properly initialize memory in
messages passed between virtual guests and the host operating system. This
could have allowed local privileged users to read some kernel memory contents
when reading from the /dev/vhost-net device file (bsc#1092472)
- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by
calling setxattr twice with two different extended attribute names on the same
file. This vulnerability could be triggered by an unprivileged user with the
ability to create files and execute programs (bsc#1097234)
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
ioctl (bsc#1096728)
- CVE-2018-3639: Systems with microprocessors utilizing speculative execution
and speculative execution of memory reads the addresses of all prior memory
writes are known may have allowed unauthorized disclosure of information to an
attacker with local user access via a side-channel analysis, aka Speculative
Store Bypass (SSB), Variant 4 (bsc#1087082)
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory
containing command line arguments (or environment strings), an attacker could
have caused utilities from psutils or procps (such as ps, w) to block
indefinitely (denial of service) or for some controlled time (as a
synchronization primitive for other attacks) (bsc#1093158)
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
crc32c checksum driver, which allowed attackers to cause a denial of service
(ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
ext4 image (bsc#1087007)
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
with a zero i_links_count, which allowed attackers to cause a denial of service
(ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
image (bsc#1087012)
- 1093: The ext4_valid_block_bitmap function allowed attackers to cause a
denial of service (out-of-bounds read and system crash) via a crafted ext4
image because balloc.c and ialloc.c do not validate bitmap block numbers
(bsc#1087095)
- CVE-2018-1000200: Prevent NULL pointer dereference which could have resulted
in an out of memory (OOM) killing of large mlocked processes (bsc#1090150)
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bsc#1092904)
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
handling SCTP packets length that could have been exploited to cause a kernel
crash (bnc#1083900)
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
__rds_rdma_map() function that allowed local attackers to cause a system panic
and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
(bsc#1082962)
- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability
allowing local users with access to the udldrmfb driver to obtain full read and
write permissions on kernel physical pages, resulting in a code execution in
kernel space (bsc#1090643)
- CVE-2018-10124: The kill_something_info function in kernel/signal.c might
have allowed local users to cause a denial of service via an INT_MIN argument
(bnc#1089752)
- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed
local users to cause a denial of service by triggering an attempted use of the
-INT_MIN value (bnc#1089608)
- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker
with local user access caused by speculative execution and indirect branch
prediction (bsc#1068032)
The following non-security bugs were fixed:
- Fix copy_in_user() declaration (bsc#1052766).
- 1wire: family module autoload fails because of upper/lower case mismatch (bsc#1051510).
- 8021q: fix a memory leak for VLAN 0 device (networking-stable-18_01_12).
- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (networking-stable-18_05_15).
- 8139too: revisit napi_complete_done() usage (networking-stable-17_10_09).
- 9p/trans_virtio: discard zero-length reply (bsc#1052766).
- ACPI / APEI: Replace ioremap_page_range() with fixmap (bsc#1051510).
- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bsc#1051510).
- ACPI / NUMA: ia64: Parse all entries of SRAT memory affinity table (bnc#1088796).
- ACPI / bus: Do not call _STA on battery devices with unmet dependencies (bsc#1051510).
- ACPI / button: make module loadable when booted in non-ACPI mode (bsc#1051510).
- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bsc#1051510).
- ACPI / scan: Initialize watchdog before PNP (bsc#1073960).
- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).
- ACPI / scan: Use acpi_bus_get_status() to initialize ACPI_TYPE_DEVICE devs (bsc#1051510).
- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bsc#1051510).
- ACPI / video: Default lcd_only to true on Win8-ready and newer machines (bsc#1051510).
- ACPI / video: Only default only_lcd to true on Win8-ready _desktops_ (bsc#1051510).
- ACPI / watchdog: Prefer iTCO_wdt on Lenovo Z50-70 (bsc#1051510).
- ACPI / watchdog: properly initialize resources (bsc#1051510).
- ACPI: EC: Fix debugfs_create_*() usage (bsc#1051510).
- ACPI: acpi_pad: Fix memory leak in power saving threads (bsc#1051510).
- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bsc#1051510).
- ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEs (bsc#1051510).
- ACPICA: ACPI 6.0A: Changes to the NFIT ACPI table (bsc#1091424).
- ACPICA: Events: add a return on failure from acpi_hw_register_read (bsc#1051510).
- ACPICA: Fix memory leak on unusual memory leak (bsc#1051510).
- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bsc#1051510).
- ALSA: aloop: Add missing cable lock to ctl API callbacks (bsc#1051510).
- ALSA: aloop: Mark paused device as inactive (bsc#1051510).
- ALSA: asihpi: Hardening for potential Spectre v1 (bsc#1051510).
- ALSA: caiaq: Add yet more sanity checks for invalid EPs (bsc#1051510).
- ALSA: control: Hardening for potential Spectre v1 (bsc#1051510).
- ALSA: control: fix a redundant-copy issue (bsc#1051510).
- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bsc#1051510).
- ALSA: dice: fix OUI for TC group (bsc#1051510).
- ALSA: dice: fix error path to destroy initialized stream data (bsc#1051510).
- ALSA: dice: fix kernel NULL pointer dereference due to invalid calculation for array index (bsc#1051510).
- ALSA: emu10k1: Fix kABI breakage (bsc#1093027).
- ALSA: emu10k1: add a IOMMU workaround (bsc#1093027).
- ALSA: emu10k1: add optional debug printouts with DMA addresses (bsc#1093027).
- ALSA: emu10k1: make sure synth DMA pages are allocated with DMA functions (bsc#1093027).
- ALSA: emu10k1: remove reserved_page (bsc#1093027).
- ALSA: emu10k1: use dma_set_mask_and_coherent() (bsc#1093027).
- ALSA: hda - Fix incorrect usage of IS_REACHABLE() (bsc#1051510).
- ALSA: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bsc#1051510).
- ALSA: hda - New VIA controller suppor no-snoop path (bsc#1051510).
- ALSA: hda - Skip jack and others for non-existing PCM streams (bsc#1051510).
- ALSA: hda/ca0132 - use ARRAY_SIZE (bsc#1051510).
- ALSA: hda/ca0132: Add DSP Volume set and New mixers for SBZ + R3Di (bsc#1096696).
- ALSA: hda/ca0132: Add PCI region2 iomap for SBZ (bsc#1096696).
- ALSA: hda/ca0132: Add dsp setup + gpio functions for r3di (bsc#1096696).
- ALSA: hda/ca0132: Add extra exit functions for R3Di and SBZ (bsc#1096696).
- ALSA: hda/ca0132: Add new control changes for SBZ + R3Di (bsc#1096696).
- ALSA: hda/ca0132: Add pincfg for SBZ + R3Di, add fp hp auto-detect (bsc#1096696).
- ALSA: hda/ca0132: Delete pointless assignments to struct auto_pin_cfg fields (bsc#1051510).
- ALSA: hda/ca0132: Delete redundant UNSOL event requests (bsc#1051510).
- ALSA: hda/ca0132: Do not test for QUIRK_NONE (bsc#1051510).
- ALSA: hda/ca0132: Fix DMic data rate for Alienware M17x R4 (bsc#1051510).
- ALSA: hda/ca0132: R3Di and SBZ quirk entires + alt firmware loading (bsc#1096696).
- ALSA: hda/ca0132: Restore PCM Analog Mic-In2 (bsc#1051510).
- ALSA: hda/ca0132: Restore behavior of QUIRK_ALIENWARE (bsc#1051510).
- ALSA: hda/ca0132: add alt_select_in/out for R3Di + SBZ (bsc#1096696).
- ALSA: hda/ca0132: add ca0132_alt_set_vipsource (bsc#1096696).
- ALSA: hda/ca0132: add dsp setup related commands for the sbz (bsc#1096696).
- ALSA: hda/ca0132: add extra init functions for r3di + sbz (bsc#1096696).
- ALSA: hda/ca0132: add the ability to set src_id on scp commands (bsc#1096696).
- ALSA: hda/ca0132: constify parameter table for effects (bsc#1096696).
- ALSA: hda/ca0132: constify read-only members of string array (bsc#1096696).
- ALSA: hda/ca0132: constify templates for control element set (bsc#1096696).
- ALSA: hda/ca0132: fix array_size.cocci warnings (bsc#1096696).
- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1051510).
- ALSA: hda/ca0132: make array ca0132_alt_chmaps static (bsc#1051510).
- ALSA: hda/ca0132: merge strings just for printk (bsc#1096696).
- ALSA: hda/ca0132: update core functions for sbz + r3di (bsc#1096696).
- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).
- ALSA: hda/conexant - Add hp-mic-fix model string (bsc#1092975).
- ALSA: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1051510).
- ALSA: hda/realtek - Add shutup hint (bsc#1051510).
- ALSA: hda/realtek - Add some fixes for ALC233 (bsc#1051510).
- ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup (bsc#1051510).
- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs (bsc#1051510).
- ALSA: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1051510).
- ALSA: hda/realtek - Fix the problem of two front mics on more machines (bsc#1051510).
- ALSA: hda/realtek - Fixup for HP x360 laptops with BandO speakers (bsc#1096705).
- ALSA: hda/realtek - Fixup mute led on HP Spectre x360 (bsc#1096705).
- ALSA: hda/realtek - Refactor alc269_fixup_hp_mute_led_mic*() (bsc#1096705).
- ALSA: hda/realtek - Update ALC255 depop optimize (bsc#1051510).
- ALSA: hda/realtek - adjust the location of one mic (bsc#1051510).
- ALSA: hda/realtek - change the location for one of two front mics (bsc#1051510).
- ALSA: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1051510).
- ALSA: hda: Add ASRock H81M-HDS to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add Clevo W35xSS_370SS to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add Gigabyte P55A-UD3 and Z87-D3HP to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add Icelake PCI ID (bsc#1051510).
- ALSA: hda: Add Intel NUC5i7RY to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add Intel NUC7i3BNB to the power_save blacklist (bsc#1051510).
- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bsc#1051510).
- ALSA: hda: Hardening for potential Spectre v1 (bsc#1051510).
- ALSA: hda: add dock and led support for HP EliteBook 830 G5 (bsc#1051510).
- ALSA: hda: add dock and led support for HP ProBook 640 G4 (bsc#1051510).
- ALSA: hdspm: Hardening for potential Spectre v1 (bsc#1051510).
- ALSA: hiface: Add sanity checks for invalid EPs (bsc#1051510).
- ALSA: line6: Add yet more sanity checks for invalid EPs (bsc#1051510).
- ALSA: line6: Use correct endpoint type for midi output (bsc#1051510).
- ALSA: line6: add support for POD HD DESKTOP (bsc#1051510).
- ALSA: line6: add support for POD HD500X (bsc#1051510).
- ALSA: line6: remove unnecessary initialization to PODHD500X (bsc#1051510).
- ALSA: opl3: Hardening for potential Spectre v1 (bsc#1051510).
- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bsc#1051510).
- ALSA: pcm: Check PCM state at xfern compat ioctl (bsc#1051510).
- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bsc#1051510).
- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bsc#1051510).
- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bsc#1051510).
- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bsc#1051510).
- ALSA: pcm: potential uninitialized return values (bsc#1051510).
- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bsc#1051510).
- ALSA: rme9652: Hardening for potential Spectre v1 (bsc#1051510).
- ALSA: seq: Fix UBSAN warning at SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT ioctl (bsc#1051510).
- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bsc#1051510).
- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bsc#1051510).
- ALSA: seq: oss: Hardening for potential Spectre v1 (bsc#1051510).
- ALSA: timer: Fix UBSAN warning at SNDRV_TIMER_IOCTL_NEXT_DEVICE ioctl (bsc#1051510).
- ALSA: timer: Fix pause event notification (bsc#1051510).
- ALSA: usb-audio: Add 'Keep Interface' control (bsc#1089467).
- ALSA: usb-audio: Add a quirk for Nura's first gen headset (bsc#1051510).
- ALSA: usb-audio: Add keep_iface flag (bsc#1089467).
- ALSA: usb-audio: Add native DSD support for Luxman DA-06 (bsc#1051510).
- ALSA: usb-audio: Add native DSD support for Mytek DACs (bsc#1051510).
- ALSA: usb-audio: Add native DSD support for TEAC UD-301 (bsc#1051510).
- ALSA: usb-audio: Add sample rate quirk for Plantronics C310/C520-M (bsc#1051510).
- ALSA: usb-audio: Add sample rate quirk for Plantronics P610 (bsc#1051510).
- ALSA: usb-audio: Add sanity checks for invalid EPs (bsc#1051510).
- ALSA: usb-audio: Allow to override the longname string (bsc#1091678).
- ALSA: usb-audio: Apply vendor ID matching for sample rate quirk (bsc#1051510).
- ALSA: usb-audio: Avoid superfluous usb_set_interface() calls (bsc#1089467).
- ALSA: usb-audio: Change the semantics of the enable option (bsc#1051510).
- ALSA: usb-audio: Disable the quirk for Nura headset (bsc#1051510).
- ALSA: usb-audio: FIX native DSD support for TEAC UD-501 DAC (bsc#1051510).
- ALSA: usb-audio: Generic DSD detection for XMOS-based implementations (bsc#1051510).
- ALSA: usb-audio: Give proper vendor/product name for Dell WD15 Dock (bsc#1091678).
- ALSA: usb-audio: Initialize Dell Dock playback volumes (bsc#1089467).
- ALSA: usb-audio: Integrate native DSD support for ITF-USB based DACs (bsc#1051510).
- ALSA: usb-audio: Remove explicitly listed Mytek devices (bsc#1051510).
- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).
- ALSA: usb-audio: Support changing input on Sound Blaster E1 (bsc#1051510).
- ALSA: usb-audio: add boot quirk for Axe-Fx III (bsc#1051510).
- ALSA: usb-audio: add more quirks for DSD interfaces (bsc#1051510).
- ALSA: usb-audio: simplify set_sync_ep_implicit_fb_quirk (bsc#1051510).
- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bsc#1051510).
- ALSA: usx2y: Add sanity checks for invalid EPs (bsc#1051510).
- ALSA: usx2y: Fix invalid stream URBs (bsc#1051510).
- ALSA: vmaster: Propagate slave error (bsc#1051510).
- ASoC: Intel: Skylake: Disable clock gating during firmware and library download (bsc#1051510).
- ASoC: Intel: cht_bsw_rt5645: Analog Mic support (bsc#1051510).
- ASoC: Intel: sst: remove redundant variable dma_dev_name (bsc#1051510).
- ASoC: adau17x1: Handling of DSP_RUN register during fw setup (bsc#1051510).
- ASoC: cirrus: i2s: Fix LRCLK configuration (bsc#1051510).
- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bsc#1051510).
- ASoC: cs35l35: Add use_single_rw to regmap config (bsc#1051510).
- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bsc#1051510).
- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bsc#1051510).
- ASoC: hdmi-codec: Fix module unloading caused kernel crash (bsc#1051510).
- ASoC: hdmi-codec: fix spelling mistake: 'deteced' -> 'detected' (bsc#1051510).
- ASoC: hdmi-codec: remove multi detection support (bsc#1051510).
- ASoC: omap: Remove OMAP_MUX dependency from Nokia N810 audio support (bsc#1051510).
- ASoC: rockchip: Fix dai_name for HDMI codec (bsc#1051510).
- ASoC: rockchip: rk3288-hdmi-analog: Select needed codecs (bsc#1051510).
- ASoC: rsnd: mark PM functions __maybe_unused (bsc#1051510).
- ASoC: rt5514: Add the missing register in the readable table (bsc#1051510).
- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bsc#1051510).
- ASoC: samsung: odroid: Drop requirement of clocks in the sound node (bsc#1051510).
- ASoC: samsung: odroid: Fix 32000 sample rate handling (bsc#1051510).
- ASoC: samsung: odroid: Fix EPLL frequency values (bsc#1051510).
- ASoC: ssm2602: Replace reg_default_raw with reg_default (bsc#1051510).
- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).
- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).
- ASoC: topology: Fix bugs of freeing soc topology (bsc#1051510).
- ASoC: topology: Fix kcontrol name string handling (bsc#1051510).
- ASoC: topology: create TLV data for dapm widgets (bsc#1051510).
- ASoC: topology: fix some tiny memory leaks (bsc#1051510).
- Bluetooth: Add a new 04ca:3015 QCA_ROME device (bsc#1051510).
- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504).
- Bluetooth: Fix missing encryption refresh on Security Request (bsc#1051510).
- Bluetooth: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for BTUSB_QCA_ROME (bsc#1051510).
- Bluetooth: btrtl: Fix a error code in rtl_load_config() (bsc#1051510).
- Bluetooth: btusb: Add Dell XPS 13 9360 to btusb_needs_reset_resume_table (bsc#1051510).
- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bsc#1051510).
- Bluetooth: btusb: Add device ID for RTL8822BE (bsc#1051510).
- Bluetooth: btusb: Only check needs_reset_resume DMI table for QCA rome chipsets (bsc#1051510).
- Bluetooth: btusb: add ID for LiteOn 04ca:3016 (bsc#1051510).
- Bluetooth: hci_bcm: Add 6 new ACPI HIDs (bsc#1051510).
- Bluetooth: hci_bcm: Add active_low irq polarity quirk for Asus T100CHI (bsc#1051510).
- Bluetooth: hci_bcm: Add support for BCM2E72 (bsc#1051510).
- Bluetooth: hci_bcm: Add support for MINIX Z83-4 based devices (bsc#1051510).
- Bluetooth: hci_bcm: Fix setting of irq trigger type (bsc#1051510).
- Bluetooth: hci_bcm: Handle empty packet after firmware loading (bsc#1051510).
- Bluetooth: hci_bcm: Make bcm_request_irq fail if no IRQ resource (bsc#1051510).
- Bluetooth: hci_bcm: Remove DMI quirk for the MINIX Z83-4 (bsc#1051510).
- Bluetooth: hci_bcm: Treat Interrupt ACPI resources as always being active-low (bsc#1051510).
- Bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bsc#1051510).
- Btrfs: fix copy_items() return value when logging an inode (bsc#1097105).
- Btrfs: fix xattr loss after power failure (bsc#1097105).
- Btrfs: use btrfs_op instead of bio_op in __btrfs_map_block (bsc#1099918).
- Correct bug reference in the patch (bnc#1095155)
- Delete patches.arch/powerpc64-ftrace-Use-the-generic-version-of-ftrace_r.patch (bsc#1088804).
- Downgrade printk level for MMC SDHCI host version error (bsc#1097941).
- Fix kABI breakage due to acpi_ec gpe field change (bsc#1051510).
- Fix kABI breakage due to snd_usb_audio_quirk profile_name addition (bsc#1091678).
- Fix kABI breakage due to sound/timer.h inclusion (bsc#1051510).
- Fix kABI breakage for iwl_fw_runtime_ops change (bsc#1051510).
- Fix kABI breakage for iwlwifi (bsc#1051510).
- Fix kABI breakage of iio_buffer (bsc#1051510).
- Fix kABI incompatibility by snd_pcm_oss_runtime.rw_ref addition (bsc#1051510).
- Fix the build error in adau17x1 soc driver (bsc#1051510)
- Fix the build of da9063_wdt module (bsc#1100843) Backport the missing prerequisite commit, move the previous fixes into the sorted section and refresh.
- GFS2: Take inode off order_write list when setting jdata flag (bsc#1052766).
- HID: add backlight level quirk for Asus ROG laptops (bsc#1101324).
- HID: cp2112: fix broken gpio_direction_input callback (bsc#1051510).
- HID: debug: check length before copy_to_user() (bsc#1051510).
- HID: hiddev: fix potential Spectre v1 (bsc#1051510).
- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bsc#1051510).
- HID: i2c-hid: Fix 'incomplete report' noise (bsc#1051510).
- HID: i2c-hid: fix size check and type usage (bsc#1051510).
- HID: intel-ish-hid: Enable Gemini Lake ish driver (bsc#1073765,).
- HID: intel-ish-hid: use put_device() instead of kfree() (bsc#1051510).
- HID: intel_ish-hid: ipc: register more pm callbacks to support hibernation (bsc#1051510).
- HID: lenovo: Add support for IBM/Lenovo Scrollpoint mice (bsc#1051510).
- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1051510).
- HID: wacom: Add support for One by Wacom (CTL-472 / CTL-672) (bsc#1100633).
- HID: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro large (bsc#1051510).
- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bsc#1051510).
- HID: wacom: EKR: ensure devres groups at higher indexes are released (bsc#1051510).
- HID: wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events (bsc#1051510).
- HID: wacom: Release device resource data obtained by devres_alloc() (bsc#1051510).
- HID: wacom: bluetooth: send exit report for recent Bluetooth devices (bsc#1051510).
- IB/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793).
- IB/core: Generate GID change event regardless of RoCE GID table property (bsc#1046306).
- IB/core: Refer to RoCE port property instead of GID table property (bsc#1046306).
- IB/cq: Do not force IB_POLL_DIRECT poll context for ib_process_cq_direct (bsc#1046306).
- IB/hfi1 Use correct type for num_user_context (bsc#1096793).
- IB/hfi1: Add a safe wrapper for _rcd_get_by_index (bsc#1096793).
- IB/hfi1: Add tx_opcode_stats like the opcode_stats (bsc#1096793).
- IB/hfi1: Complete check for locally terminated smp (bsc#1096793).
- IB/hfi1: Compute BTH only for RDMA_WRITE_LAST/SEND_LAST packet (bsc#1096793).
- IB/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793).
- IB/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793).
- IB/hfi1: Do not allocate PIO send contexts for VNIC (bsc#1096793).
- IB/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793).
- IB/hfi1: Do not override given pcie_pset value (bsc#1096793).
- IB/hfi1: Ensure VL index is within bounds (bsc#1096793).
- IB/hfi1: Fix NULL pointer dereference when invalid num_vls is used (bsc#1060463).
- IB/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793).
- IB/hfi1: Fix for early release of sdma context (bsc#1096793).
- IB/hfi1: Fix handling of FECN marked multicast packet (bsc#1060463).
- IB/hfi1: Fix loss of BECN with AHG (bsc#1096793).
- IB/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793).
- IB/hfi1: Fix serdes loopback set-up (bsc#1096793).
- IB/hfi1: Handle initial value of 0 for CCTI setting (bsc#1096793).
- IB/hfi1: Inline common calculation (bsc#1096793).
- IB/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793).
- IB/hfi1: Look up ibport using a pointer in receive path (bsc#1096793).
- IB/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793).
- IB/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793).
- IB/hfi1: Prevent LNI hang when LCB can't obtain lanes (bsc#1096793).
- IB/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793).
- IB/hfi1: Race condition between user notification and driver state (bsc#1096793).
- IB/hfi1: Re-order IRQ cleanup to address driver cleanup race (bsc#1060463).
- IB/hfi1: Refactor assign_ctxt() IOCTL (bsc#1096793).
- IB/hfi1: Refactor get_base_info (bsc#1096793).
- IB/hfi1: Refactor get_ctxt_info (bsc#1096793).
- IB/hfi1: Refactor get_user() IOCTLs (bsc#1096793).
- IB/hfi1: Refactor hfi_user_exp_rcv_clear() IOCTLs (bsc#1096793).
- IB/hfi1: Refactor hfi_user_exp_rcv_invalid() IOCTLs (bsc#1096793).
- IB/hfi1: Refactor hfi_user_exp_rcv_setup() IOCTL (bsc#1096793).
- IB/hfi1: Remove unused hfi1_cpulist variables (bsc#1096793).
- IB/hfi1: Reorder incorrect send context disable (bsc#1096793).
- IB/hfi1: Return correct value for device state (bsc#1096793).
- IB/hfi1: Send 'reboot' as planned down remote reason (bsc#1096793).
- IB/hfi1: Set port number for errorinfo MAD response (bsc#1096793).
- IB/hfi1: Show fault stats in both TX and RX directions (bsc#1096793).
- IB/hfi1: Update HFI to use the latest PCI API (bsc#1096793).
- IB/hfi1: Use after free race condition in send context error path (bsc#1096793).
- IB/hfi1: Validate PKEY for incoming GSI MAD packets (bsc#1096793).
- IB/ipoib: Avoid memory leak if the SA returns a different DGID (bsc#1046307).
- IB/ipoib: Change number of TX wqe to 64 (bsc#1096793).
- IB/ipoib: Fix for notify send CQ failure messages (bsc#1096793).
- IB/ipoib: Fix for potential no-carrier state (bsc#1046307).
- IB/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793).
- IB/ipoib: Use NAPI in UD/TX flows (bsc#1096793).
- IB/mlx4: Fix integer overflow when calculating optimal MTT size (bsc#1071218).
- IB/mlx4: Move mlx4_uverbs_ex_query_device_resp to include/uapi/ (bsc#1071218).
- IB/mlx5: Enable ECN capable bits for UD RoCE v2 QPs (bsc#1046305).
- IB/mlx5: Respect new UMR capabilities (bsc#1093205).
- IB/mlx5: Set the default active rate and width to QDR and 4X (bsc#1046305).
- IB/mlx5: Use unlimited rate when static rate is not supported (bsc#1046305).
- IB/mlx5:: pr_err() and mlx5_ib_dbg() strings should end with newlines (bsc#1093205).
- IB/rdmavt: Add trace for RNRNAK timer (bsc#1096793).
- IB/rdmavt: Allocate CQ memory on the correct node (bsc#1058717).
- IB/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793).
- IB/rdmavt: Use correct numa node for SRQ allocation (bsc#1096793).
- IB/srp: Fix completion vector assignment algorithm (bsc#1046306).
- IB/srp: Fix srp_abort() (bsc#1046306).
- IB/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bsc#1046306).
- IB/uverbs: Fix validating mandatory attributes (bsc#1046306).
- IB/{hfi1, qib}: Add handling of kernel restart (bsc#1096793).
- IB/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793).
- IB/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793).
- Input: ALPS - fix TrackStick detection on Thinkpad L570 and Latitude 7370 (bsc#1051510).
- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bsc#1051510).
- Input: atmel_mxt_ts - fix the firmware update (bsc#1051510).
- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bsc#1051510).
- Input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bsc#1051510).
- Input: elan_i2c_smbus - fix corrupted stack (bsc#1051510).
- Input: elan_i2c_smbus - fix more potential stack buffer overflows (bsc#1051510).
- Input: elantech - enable middle button of touchpads on ThinkPad P52 (bsc#1051510).
- Input: elantech - fix V4 report decoding for module with middle key (bsc#1051510).
- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bsc#1051510).
- Input: goodix - disable IRQs while suspended (bsc#1051510).
- Input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bsc#1051510).
- Input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bsc#1051510).
- Input: leds - fix out of bound access (bsc#1051510).
- Input: synaptics - Lenovo Carbon X1 Gen5 (2017) devices should use RMI (bsc#1051510).
- Input: synaptics - Lenovo Thinkpad X1 Carbon G5 (2017) with Elantech trackpoints should use RMI (bsc#1051510).
- Input: synaptics - add Intertouch support on X1 Carbon 6th and X280 (bsc#1051510).
- Input: synaptics - add Lenovo 80 series ids to SMBus (bsc#1051510).
- Input: synaptics - reset the ABS_X/Y fuzz after initializing MT axes (bsc#1051510).
- Input: synaptics-rmi4 - fix an unchecked out of memory error path (bsc#1051510).
- Input: synaptics: Add intertouch blacklist for Thinkpad Helix (bsc#1090457).
- Input: xpad - add GPD Win 2 Controller USB IDs (bsc#1051510).
- Input: xpad - fix GPD Win 2 controller name (bsc#1051510).
- Input: xpad - sync supported devices with 360Controller (bsc#1051510).
- Input: xpad - sync supported devices with XBCD (bsc#1051510).
- KABI protect struct nd_region ().
- KABI: hide ftrace_enabled in paca (bsc#1088804).
- KEYS: DNS: limit the length of option strings (networking-stable-18_04_26).
- KEYS: Use individual pages in big_key for crypto buffers (bsc#1051510).
- KVM: MMU: consider host cache mode in MMIO page check (bsc#1087213).
- KVM: PPC: Book3S HV: Fix ppc_breakpoint_available compile error (bsc#1061840).
- KVM: PPC: Book3S HV: Handle migration with POWER9 disabled DAWR (bsc#1061840).
- KVM: PPC: Book3S HV: Return error from h_set_dabr() on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: Return error from h_set_mode(SET_DAWR) on POWER9 (bsc#1061840).
- KVM: PPC: Book3S HV: trace_tlbie must not be called in realmode (bsc#1061840).
- MD: Free bioset when md_run fails (bsc#1093023).
- Move upstreamed ideapad-laptop patch to sorted section (bsc#1093035)
- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bsc#1090888).
- NFC: fix device-allocation error return (bsc#1051510).
- NFC: llcp: Limit size of SDP URI (bsc#1051510).
- NFC: pn533: do not send USB data off of the stack (bsc#1051510).
- NFS: Revert 'NFS: Move the flock open mode check into nfs_flock()' (bsc#1098983).
- NFSv4: Revert commit 5f83d86cf531d ('NFSv4.x: Fix wraparound issues..') (git-fixes).
- PCI/ASPM: Add L1 Substates definitions (bsc#1051510).
- PCI/ASPM: Calculate LTR_L1.2_THRESHOLD from device characteristics (bsc#1051510).
- PCI/DPC: Do not enable DPC if AER control is not allowed by the BIOS (bsc#1093184).
- PCI/PME: Handle invalid data when reading Root Status (bsc#1051510).
- PCI: Add ACS quirk for Intel 300 series (bsc#1051510).
- PCI: Add ACS quirk for Intel 7th and 8th Gen mobile (bsc#1051510).
- PCI: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bsc#1051510).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bsc#1051510).
- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bsc#1051510).
- PCI: Create SR-IOV virtfn/physfn links before attaching driver (bsc#1051510).
- PCI: Detach driver before procfs and sysfs teardown on device remove (bsc#1051510).
- PCI: Mark Broadcom HT1100 and HT2000 Root Port Extended Tags as broken (bsc#1051510).
- PCI: Remove messages about reassigning resources (bsc#1051510).
- PCI: Restore config space on runtime resume despite being unbound (bsc#1051510).
- PCI: aardvark: Fix PCIe Max Read Request Size setting (bsc#1051510).
- PCI: aardvark: Fix logic in advk_pcie_{rd,wr}_conf() (bsc#1051510).
- PCI: aardvark: Set PIO_ADDR_LS correctly in advk_pcie_rd_conf() (bsc#1051510).
- PCI: aardvark: Use ISR1 instead of ISR0 interrupt in legacy irq mode (bsc#1051510).
- PCI: designware-ep: Fix find_first_zero_bit() usage (bsc#1051510).
- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094541).
- PCI: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bsc#1051510).
- PCI: shpchp: Enable bridge bus mastering if MSI is enabled (bsc#1051510).
- PM / OPP: Add missing of_node_put(np) (bsc#1051510).
- PM / OPP: Call notifier without holding opp_table->lock (bsc#1051510).
- PM / OPP: Move error message to debug level (bsc#1051510).
- PM / devfreq: Fix potential NULL pointer dereference in governor_store (bsc#1051510).
- PM / s2idle: Clear the events_check_enabled flag (bsc#1051510).
- PM / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1051510).
- PM: docs: Drop an excess character from devices.rst (bsc#1051510).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- Preliminary series sort
- RDMA/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283).
- RDMA/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283).
- RDMA/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (bsc#1046306).
- RDMA/core: Reduce poll batch for direct cq polling (bsc#1046306).
- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#1084001).
- RDMA/mlx4: Fix uABI structure layouts for 32/64 compat (bsc#1071218).
- RDMA/mlx5: Fix crash while accessing garbage pointer and freed memory (bsc#1046305).
- RDMA/mlx5: Protect from NULL pointer derefence (bsc#1046305).
- RDMA/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bsc#1058513).
- RDMA/rxe: Fix an out-of-bounds read (bsc#1050662).
- RDMA/ucma: Allow resolving address w/o specifying source address (bsc#1046306).
- RDMA/ucma: Introduce safer rdma_addr_size() variants (bsc#1046306).
- RDMAVT: Fix synchronization around percpu_ref (bsc#1058717).
- RDS: Check cmsg_len before dereferencing CMSG_DATA (networking-stable-17_12_31).
- README.BRANCH: add Takashi as co-maintainer
- Re-sort some patches to match SLE15
- Refresh patches.suse/btrfs-use-kvzalloc-to-allocate-btrfs_fs_info.patch - Fixed References (bsc#1062897).
- Remove the old fallback for iTCO/WDAT conflict (bsc#1073960) Now the upstream fix is included, so let's rip off the old trickery.
- Revert 'Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174' (bsc#1051510).
- Revert 'Remove patces for bug 1087405 due to regression' This reverts commit f91a2ea5192d9e933c41600da5d1543155df381c.
- Revert 'ath10k: send (re)assoc peer command when NSS changed' (bsc#1051510).
- Revert 'drm/i915/edp: Allow alternate fixed mode for eDP if available.' (bsc#1093604).
- Revert 'kernel-binary: do not package extract-cert when not signing modules' This reverts commit 10a8bc496a553b8069d490a8ae7508bdb19f58d9.
- Revert 'rt2800: use TXOP_BACKOFF for probe frames' (bsc#1051510).
- Revert 'scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte()' (bsc#1099918).
- Sort series.conf
- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).
- USB: serial: pl2303: new device id for Chilitag (bsc#1087092).
- USB: serial: simple: add Motorola Tetra driver (bsc#1087092).
- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bsc#1090888).
- Update patches.fixes/vti-fix-use-after-free-in-vti_tunnel_xmit-vti6_tnl_x.patch (bsc#1076830 networking-stable-17_10_09).
- Update patches.suse/ceph-quota-add-counter-for-snaprealms-with-quota.patch (bsc#1089115).
- Update patches.suse/ceph-quota-add-initial-infrastructure-to-support-cephfs-quotas.patch (bsc#1089115).
- Update patches.suse/ceph-quota-cache-inode-pointer-in-ceph_snap_realm.patch (bsc#1089115).
- Update patches.suse/ceph-quota-don-t-allow-cross-quota-renames.patch (bsc#1089115).
- Update patches.suse/ceph-quota-support-for-ceph-quota-max_bytes.patch (bsc#1089115).
- Update patches.suse/ceph-quota-support-for-ceph-quota-max_files.patch (bsc#1089115).
- Update patches.suse/ceph-quota-update-mds-when-max_bytes-is-approaching.patch (bsc#1089115).
- Update for above change patches.drivers/0003-md-cluster-Suspend-writes-in-RAID10-if-within-range.patch (bsc#1093023).
- Update patches.suse/ceph-don-t-check-quota-for-snap-inode.patch (bsc#1089115).
- Update patches.suse/ceph-fix-root-quota-realm-check.patch (bsc#1089115).
- X.509: fix BUG_ON() when hash algorithm is unsupported (bsc#1051510).
- X.509: fix NULL dereference when restricting key with unsupported_sig (bsc#1051510).
- X.509: fix comparisons of ->pkey_algo (bsc#1051510).
- X.509: reject invalid BIT STRING for subjectPublicKey (bsc#1051510).
- acpi, nfit: quiet invalid block-aperture-region warnings (bsc#1091781).
- acpi, nfit: rework NVDIMM leaf method detection (bsc#1091782).
- acpi: Add helper for deactivating memory region (bsc#1100132).
- acpi: nfit: Add support for detect platform CPU cache flush on power loss (bsc#1091424).
- acpi: nfit: add persistent memory control flag for nd_region (bsc#1091424).
- adding missing rcu_read_unlock in ipxip6_rcv (networking-stable-17_12_31).
- af_netlink: ensure that NLMSG_DONE never fails in dumps (networking-stable-17_11_20).
- afs: Connect up the CB.ProbeUuid (bsc#1052766).
- afs: Fix missing error handling in afs_write_end() (bsc#1052766).
- amd-xgbe: Add pre/post auto-negotiation phy hooks (networking-stable-18_04_26).
- amd-xgbe: Improve KR auto-negotiation and training (networking-stable-18_04_26).
- amd-xgbe: Only use the SFP supported transceiver signals (networking-stable-18_04_26).
- amd-xgbe: Restore PCI interrupt enablement setting on resume (networking-stable-18_03_07).
- apparmor: fix dangling symlinks to policy rawdata after replacement (bsc#1095893).
- apparmor: fix display of .ns_name for containers (bsc#1095893).
- apparmor: fix logging of the existence test for signals (bsc#1095893).
- apparmor: fix memory leak on buffer on error exit path (bsc#1095893).
- arch/*: Kconfig: fix documentation for NMI watchdog (bsc#1099918).
- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).
- arm64: Add 'ssbd' command-line option (bsc#1085308).
- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).
- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).
- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).
- arm64: alternatives: Add dynamic patching feature (bsc#1085308).
- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).
- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).
- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).
- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).
- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).
- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).
- arp: fix arp_filter on l3slave devices (networking-stable-18_04_10).
- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bsc#1051510).
- ath10k: correct target assert problem due to CE5 stuck (bsc#1051510).
- ath10k: search all IEs for variant before falling back (bsc#1051510).
- ath9k: fix crash in spectral scan (bsc#1051510).
- auxdisplay: fix broken menu (bsc#1051510).
- auxdisplay: img-ascii-lcd: Only build on archs that have IOMEM (bsc#1051510).
- auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- backlight: as3711_bl: Fix Device Tree node lookup (bsc#1051510).
- backlight: max8925_bl: Fix Device Tree node lookup (bsc#1051510).
- backlight: tdo24m: Fix the SPI CS between transfers (bsc#1051510).
- backlight: tps65217_bl: Fix Device Tree node lookup (bsc#1051510).
- bcache: Add __printf annotation to __bch_check_keys() (bsc#1093023).
- bcache: Annotate switch fall-through (bsc#1093023).
- bcache: Fix a compiler warning in bcache_device_init() (bsc#1093023).
- bcache: Fix indentation (bsc#1093023).
- bcache: Fix kernel-doc warnings (bsc#1093023).
- bcache: Fix, improve efficiency of closure_sync() (bsc#1093023).
- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1093023).
- bcache: Remove an unused variable (bsc#1093023).
- bcache: Suppress more warnings about set-but-not-used variables (bsc#1093023).
- bcache: Use PTR_ERR_OR_ZERO() (bsc#1093023).
- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1093023).
- bcache: add backing_request_endio() for bi_end_io (bsc#1093023).
- bcache: add io_disable to struct cached_dev (bsc#1093023).
- bcache: add journal statistic (bsc#1093023).
- bcache: add stop_when_cache_set_failed option to backing device (bsc#1093023).
- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1093023).
- bcache: allow quick writeback when backing idle (bsc#1093023).
- bcache: closures: move control bits one bit right (bsc#1093023).
- bcache: comment on direct access to bvec table (bsc#1093023).
- bcache: correct flash only vols (check all uuids) (bsc#1093023).
- bcache: count backing device I/O error for writeback I/O (bsc#1093023).
- bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1093023).
- bcache: fix error return value in memory shrink (bsc#1093023).
- bcache: fix for allocator and register thread race (bsc#1093023).
- bcache: fix for data collapse after re-attaching an attached device (bsc#1093023).
- bcache: fix high CPU occupancy during journal (bsc#1093023).
- bcache: fix inaccurate io state for detached bcache devices (bsc#1093023).
- bcache: fix incorrect sysfs output value of strip size (bsc#1093023).
- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1093023).
- bcache: fix misleading error message in bch_count_io_errors() (bsc#1093023).
- bcache: fix unmatched generic_end_io_acct() and generic_start_io_acct() (bsc#1093023).
- bcache: fix using of loop variable in memory shrink (bsc#1093023).
- bcache: fix writeback target calc on large devices (bsc#1093023).
- bcache: fix wrong return value in bch_debug_init() (bsc#1093023).
- bcache: mark closure_sync() __sched (bsc#1093023).
- bcache: move closure debug file into debug directory (bsc#1093023).
- bcache: properly set task state in bch_writeback_thread() (bsc#1093023).
- bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1093023).
- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1093023).
- bcache: ret IOERR when read meets metadata error (bsc#1093023).
- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1093023).
- bcache: return attach error when no cache set exist (bsc#1093023).
- bcache: segregate flash only volume write streams (bsc#1093023).
- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1093023).
- bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1093023).
- bcache: set error_limit correctly (bsc#1093023).
- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1093023).
- bcache: stop dc->writeback_rate_update properly (bsc#1093023).
- bcache: stop writeback thread after detaching (bsc#1093023).
- bcache: store disk name in struct cache and struct cached_dev (bsc#1093023).
- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1093023).
- bcache: writeback: properly order backing device IO (bsc#1093023).
- bdi: Fix oops in wb_workfn() (bsc#1052766).
- bdi: wake up concurrent wb_shutdown() callers (bsc#1052766).
- be2net: Fix HW stall issue in Lancer (bsc#1086288).
- be2net: Fix error detection logic for BE3 (bsc#1050252).
- be2net: Handle transmit completion errors in Lancer (bsc#1086288).
- bfq-iosched: ensure to clear bic/bfqq pointers when preparing request (bsc#1052766).
- bfq: Re-enable auto-loading when built as a module (bsc#1099918).
- bio-integrity: move the bio integrity profile check earlier in bio_integrity_prep (bsc#1093023).
- bitmap: fix memset optimization on big-endian systems (bsc#1051510).
- bitops: Introduce assign_bit() (bsc#1093023).
- blacklist.conf: blacklist further commits not needed (bsc#1085933, bsc#1085938, bsc#1085939)
- blacklist.conf: blacklist tools specific change bsc#1085941
- blk-mq-debugfs: fix device sched directory for default scheduler (bsc#1099918).
- blk-mq: do not keep offline CPUs mapped to hctx 0 (bsc#1099918).
- blk-mq: make sure hctx->next_cpu is set correctly (bsc#1099918).
- blk-mq: make sure that correct hctx->next_cpu is set (bsc#1099918).
- blk-mq: reinit q->tag_set_list entry only after grace period (bsc#1099918).
- blk-mq: simplify queue mapping and schedule with each possisble CPU (bsc#1099918).
- block, bfq: add missing invocations of bfqg_stats_update_io_add/remove (bsc#1099918).
- block, bfq: fix occurrences of request finish method's old name (bsc#1099918).
- block, bfq: put async queues for root bfq groups too (bsc#1052766).
- block/loop: fix deadlock after loop_set_status (bsc#1052766).
- block/swim: Remove extra put_disk() call from error path (bsc#1099918).
- block: Add comment to submit_bio_wait() (bsc#1093023).
- block: Fix __bio_integrity_endio() documentation (bsc#1099918).
- block: Fix cloning of requests with a special payload (bsc#1099918).
- block: Set BIO_TRACE_COMPLETION on new bio during split (bsc#1052766).
- block: cope with WRITE ZEROES failing in blkdev_issue_zeroout() (bsc#1099918).
- block: factor out __blkdev_issue_zero_pages() (bsc#1099918).
- block: sed-opal: Fix a couple off by one bugs (bsc#1099918).
- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323).
- bnx2x: Deprecate pci_get_bus_and_slot() (bsc#1086323).
- bnx2x: Replace doorbell barrier() with wmb() (bsc#1086323).
- bnx2x: Use NETIF_F_GRO_HW (bsc#1086323).
- bnx2x: Use pci_ari_enabled() instead of local copy (bsc#1086323).
- bnx2x: fix slowpath null crash (bsc#1086323).
- bnx2x: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086323).
- bnx2x: use the right constant (bsc#1086323).
- bnxt_en: Add BCM5745X NPAR device IDs (bsc#1086282).
- bnxt_en: Add IRQ remapping logic (bsc#1086282).
- bnxt_en: Add TC to hardware QoS queue mapping logic (bsc#1086282).
- bnxt_en: Add ULP calls to stop and restart IRQs (bsc#1086282).
- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282).
- bnxt_en: Add extended port statistics support (bsc#1086282).
- bnxt_en: Add support for ndo_set_vf_trust (bsc#1086282).
- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282).
- bnxt_en: Adjust default rings for multi-port NICs (bsc#1086282).
- bnxt_en: Always forward VF MAC address to the PF (bsc#1086282).
- bnxt_en: Change IRQ assignment for RDMA driver (bsc#1086282).
- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282).
- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282).
- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282).
- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282).
- bnxt_en: Do not allow VF to read EEPROM (bsc#1086282).
- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282).
- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282).
- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282).
- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282).
- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282).
- bnxt_en: Fix ethtool -x crash when device is down (bsc#1086282).
- bnxt_en: Fix firmware message delay loop regression (bsc#1086282).
- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282).
- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282).
- bnxt_en: Forward VF MAC address to the PF (bsc#1086282).
- bnxt_en: Ignore src port field in decap filter nodes (bsc#1050242).
- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282).
- bnxt_en: Implement new method to reserve rings (bsc#1086282).
- bnxt_en: Improve resource accounting for SRIOV (bsc#1086282).
- bnxt_en: Improve ring allocation logic (bsc#1086282).
- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282).
- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282).
- bnxt_en: Increase RING_IDLE minimum threshold to 50 (bsc#1086282).
- bnxt_en: Need to include RDMA rings in bnxt_check_rings() (bsc#1086282).
- bnxt_en: Pass complete VLAN TCI to the stack (bsc#1086282).
- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282).
- bnxt_en: Refactor bnxt_close_nic() (bsc#1086282).
- bnxt_en: Refactor bnxt_need_reserve_rings() (bsc#1086282).
- bnxt_en: Refactor hardware resource data structures (bsc#1086282).
- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282).
- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282).
- bnxt_en: Reserve RSS and L2 contexts for VF (bsc#1086282).
- bnxt_en: Reserve completion rings and MSIX for bnxt_re RDMA driver (bsc#1086282).
- bnxt_en: Reserve resources for RFS (bsc#1086282).
- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282).
- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282).
- bnxt_en: Restore MSIX after disabling SRIOV (bsc#1086282).
- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282).
- bnxt_en: Simplify ring alloc/free error messages (bsc#1086282).
- bnxt_en: Support max-mtu with VF-reps (bsc#1086282).
- bnxt_en: Update firmware interface to 1.9.0 (bsc#1086282).
- bnxt_en: Update firmware interface to 1.9.1.15 (bsc#1086282).
- bnxt_en: Use a dedicated VNIC mode for RDMA (bsc#1086282).
- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282).
- bnxt_en: do not allow wildcard matches for L2 flows (bsc#1050242).
- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282).
- bnxt_en: fix clear flags in ethtool reset handling (bsc#1050242).
- bnxt_en: reduce timeout on initial HWRM calls (bsc#1086282).
- bonding: discard lowest hash bit for 802.3ad layer3+4 (networking-stable-17_11_20).
- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (networking-stable-18_04_26).
- bonding: fix the err path for dev hwaddr sync in bond_enslave (networking-stable-18_04_10).
- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (networking-stable-18_04_10).
- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (networking-stable-18_04_10).
- bonding: send learning packets for vlans on slave (networking-stable-18_05_15).
- bpf, ppc64: fix out of bounds access in tail call (bsc#1083647).
- bpf, x64: fix memleak when not converging after image (bsc#1083647).
- bpf: add schedule points in percpu arrays management (bsc#1083647).
- bpf: fix bpf_skb_adjust_net/bpf_skb_proto_xlat to deal with gso sctp skbs (bsc#1076830).
- bpf: fix mlock precharge on arraymaps (bsc#1083647).
- bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (bsc#1086282).
- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).
- brcmfmac: Fix check for ISO3166 code (bsc#1051510).
- brd: fix overflow in __brd_direct_access (bsc#1052766).
- bridge: check iface upper dev when setting master via ioctl (networking-stable-18_05_15).
- Btrfs: Take trans lock before access running trans in check_delayed_ref (bsc#1097105).
- Btrfs: return error value if create_io_em failed in cow_file_range (bsc#1097105).
- can: af_can: can_pernet_init(): add missing error handling for kzalloc returning NULL (bsc#1051510).
- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).
- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).
- can: c_can: do not indicate triple sampling support for D_CAN (bsc#1051510).
- can: cc770: Fix queue stall and dropped RTR reply (bsc#1051510).
- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bsc#1051510).
- can: cc770: Fix use after free in cc770_tx_interrupt() (bsc#1051510).
- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).
- can: esd_usb2: Fix can_dlc value for received RTR, frames (bsc#1051510).
- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bsc#1051510).
- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bsc#1051510).
- can: flexcan: fix VF610 state transition issue (bsc#1051510).
- can: flexcan: fix i.MX28 state transition issue (bsc#1051510).
- can: flexcan: fix i.MX6 state transition issue (bsc#1051510).
- can: flexcan: fix p1010 state transition issue (bsc#1051510).
- can: flexcan: fix state transition regression (bsc#1051510).
- can: flexcan: implement error passive state quirk (bsc#1051510).
- can: flexcan: rename legacy error state quirk (bsc#1051510).
- can: gs_usb: fix busy loop if no more TX context is available (bsc#1051510).
- can: gs_usb: fix return value of the 'set_bittiming' callback (bsc#1051510).
- can: hi311x: Acquire SPI lock on ->do_get_berr_counter (bsc#1051510).
- can: hi311x: Work around TX complete interrupt erratum (bsc#1051510).
- can: ifi: Check core revision upon probe (bsc#1051510).
- can: ifi: Fix transmitter delay calculation (bsc#1051510).
- can: ifi: Repair the error handling (bsc#1051510).
- can: kvaser_usb: Correct return value in printout (bsc#1051510).
- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bsc#1051510).
- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bsc#1051510).
- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bsc#1051510).
- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).
- can: kvaser_usb: free buf in error paths (bsc#1051510).
- can: kvaser_usb: ratelimit errors if incomplete messages are received (bsc#1051510).
- can: mcba_usb: cancel urb on -EPROTO (bsc#1051510).
- can: mcba_usb: fix device disconnect bug (bsc#1051510).
- can: peak/pci: fix potential bug when probe() fails (bsc#1051510).
- can: peak/pcie_fd: fix echo_skb is occupied! bug (bsc#1051510).
- can: peak/pcie_fd: fix potential bug in restarting tx queue (bsc#1051510).
- can: peak/pcie_fd: remove useless code when interface starts (bsc#1051510).
- can: peak: Add support for new PCIe/M2 CAN FD interfaces (bsc#1051510).
- can: peak: fix potential bug in packet fragmentation (bsc#1051510).
- can: sun4i: fix loopback mode (bsc#1051510).
- can: sun4i: handle overrun in RX FIFO (bsc#1051510).
- can: ti_hecc: Fix napi poll return value for repoll (bsc#1051510).
- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bsc#1051510).
- can: vxcan: improve handling of missing peer name attribute (bsc#1051510).
- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (networking-stable-18_04_13).
- cdrom: information leak in cdrom_ioctl_media_changed() (bsc#1051510).
- ceph: adding protection for showing cap reservation info (bsc#1089115).
- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).
- ceph: change variable name to follow common rule (bsc#1089115).
- ceph: check if mds create snaprealm when setting quota (bsc#1089115).
- ceph: do not wait on writeback when there is no more dirty pages (bsc#1089115).
- ceph: filter out used flags when printing unused open flags (bsc#1089115).
- ceph: fix alignment of rasize (bsc#1098236).
- ceph: fix dentry leak in splice_dentry() (bsc#1098236).
- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).
- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).
- ceph: fix st_nlink stat for directories (bsc#1093904).
- ceph: fix use-after-free in ceph_statfs() (bsc#1098236).
- ceph: fix wrong check for the case of updating link count (bsc#1098236).
- ceph: keep consistent semantic in fscache related option combination (bsc#1089115).
- ceph: mark the cap cache as unreclaimable (bsc#1089115).
- ceph: optimize mds session register (bsc#1089115).
- ceph: optimize memory usage (bsc#1089115).
- ceph: optimizing cap allocation (bsc#1089115).
- ceph: optimizing cap reservation (bsc#1089115).
- ceph: prevent i_version from going back (bsc#1098236).
- ceph: quota: report root dir quota usage in statfs (bsc#1089115).
- ceph: release unreserved caps if having enough available caps (bsc#1089115).
- ceph: return proper bool type to caller instead of pointer (bsc#1089115).
- ceph: support file lock on directory (bsc#1098236).
- ceph: use seq_show_option for string type options (bsc#1089115).
- cfg80211: clear wep keys after disconnection (bsc#1051510).
- cfg80211: further limit wiphy names to 64 bytes (bsc#1051510).
- cfg80211: limit wiphy names to 128 bytes (bsc#1051510).
- cgroup: Fix deadlock in cpu hotplug path (Git-fixes).
- cgroup: Reinit cgroup_taskset structure before cgroup_migrate_execute() returns (Git-fixes).
- cifs: Check for timeout on Negotiate stage (bsc#1091171).
- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).
- config: arm64: enable Spectre-v4 per-thread mitigation
- coresight: Fix disabling of CoreSight TPIU (bsc#1051510).
- cpufreq: intel_pstate: Add HWP boost utility and sched util hooks (bsc#1066110).
- cpufreq: intel_pstate: Fix scaling max/min limits with Turbo 3.0 (bsc#1051510).
- cpufreq: intel_pstate: HWP boost performance on IO wakeup (bsc#1066110).
- cpufreq: intel_pstate: New sysfs entry to control HWP boost (bsc#1066110).
- cpufreq: intel_pstate: enable boost for Skylake Xeon (bsc#1066110).
- cpufreq: schedutil: Avoid using invalid next_freq (git-fixes).
- cpuidle: fix broadcast control when broadcast can not be entered (Git-fixes).
- cros_ec: fix nul-termination for firmware build info (bsc#1051510).
- crypto: AF_ALG - remove SGL terminator indicator when chaining (bsc#1051510).
- crypto: aes-generic - build with -Os on gcc-7+ (bsc#1051510).
- crypto: aes-generic - fix aes-generic regression on powerpc (bsc#1051510).
- crypto: af_alg - fix possible uninit-value in alg_bind() (bsc#1051510).
- crypto: ahash - Fix early termination in hash walk (bsc#1051510).
- crypto: arm,arm64 - Fix random regeneration of S_shipped (bsc#1051510).
- crypto: atmel-aes - fix the keys zeroing on errors (bsc#1051510).
- crypto: caam - Fix null dereference at error path (bsc#1051510).
- crypto: caam - fix DMA mapping dir for generated IV (bsc#1051510).
- crypto: caam - fix IV DMA mapping and updating (bsc#1051510).
- crypto: caam - fix incorrect define (bsc#1051510).
- crypto: caam - strip input zeros from RSA input buffer (bsc#1051510).
- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).
- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).
- crypto: ccp - Fix sparse, use plain integer as NULL pointer (git-fixes 200664d5237f).
- crypto: drbg - set freed buffers to NULL (bsc#1051510).
- crypto: lrw - Free rctx->ext with kzfree (bsc#1051510).
- crypto: omap-sham - fix memleak (bsc#1051510).
- crypto: qat - remove unused and redundant pointer vf_info (bsc#1051510).
- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bsc#1051510).
- crypto: vmx - Remove overly verbose printk from AES XTS init (bsc#1051510).
- crypto: vmx - Remove overly verbose printk from AES init routines (bsc#1051510).
- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bsc#1051510).
- cxgb4: Correct ntuple mask validation for hash filters (bsc#1064802 bsc#1066129).
- cxgb4: fix error return code in adap_init0() (bsc#1064802 bsc#1066129).
- cxgb4: fix offset in collecting TX rate limit info (bsc#1073513).
- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bsc#1046542).
- dax, dm: allow device-mapper to operate without dax support (bsc#1093023).
- dax: check for QUEUE_FLAG_DAX in bdev_dax_supported() (bsc#1101315).
- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (networking-stable-18_01_28).
- dccp: fix tasklet usage (networking-stable-18_05_15).
- delayacct: Account blkio completion on the correct task (bsc#1052766).
- dell_rbu: make firmware payload memory uncachable (bsc#1087978).
- device-dax: allow MAP_SYNC to succeed (bsc#1052766).
- devlink: Remove redundant free on error path (networking-stable-18_03_28).
- direct-io: Prevent NULL pointer access in submit_page_section (bsc#1052766).
- disable patches.drivers/s390-qeth-use-Read-device-to-query-hypervisor-for-MA.patch Backport of mainline commit b7493e91c11a ('s390/qeth: use Read device to query hypervisor for MAC') changes assigned MAC address (and breaks networking) on one of our machines and it's not clear which address is actually correct (bsc#1094575).
- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).
- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).
- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).
- dm btree: fix serious bug in btree_split_beneath() (bsc#1093023).
- dm bufio: add missed destroys of client mutex (bsc#1093023).
- dm bufio: check result of register_shrinker() (bsc#1093023).
- dm bufio: delete outdated comment (bsc#1093023).
- dm bufio: do not embed a bio in the dm_buffer structure (bsc#1093023).
- dm bufio: eliminate unnecessary labels in dm_bufio_client_create() (bsc#1093023).
- dm bufio: fix buffer alignment (bsc#1093023).
- dm bufio: fix integer overflow when limiting maximum cache size (bsc#1093023).
- dm bufio: fix shrinker scans when (nr_to_scan lower than retain_target) (bsc#1093023).
- dm bufio: get rid of slab cache name allocations (bsc#1093023).
- dm bufio: move dm-bufio.h to include/linux/ (bsc#1093023).
- dm bufio: relax alignment constraint on slab cache (bsc#1093023).
- dm bufio: remove code that merges slab caches (bsc#1093023).
- dm bufio: reorder fields in dm_buffer structure (bsc#1093023).
- dm bufio: support non-power-of-two block sizes (bsc#1093023).
- dm bufio: use REQ_OP_READ and REQ_OP_WRITE (bsc#1093023).
- dm bufio: use slab cache for dm_buffer structure allocations (bsc#1093023).
- dm cache background tracker: limit amount of background work that may be issued at once (bsc#1093023).
- dm cache policy smq: allocate cache blocks in order (bsc#1093023).
- dm cache policy smq: change max background work from 10240 to 4096 blocks (bsc#1093023).
- dm cache policy smq: handle races with queuing background_work (bsc#1093023).
- dm cache policy smq: take origin idle status into account when queuing writebacks (bsc#1093023).
- dm cache: convert dm_cache_metadata.ref_count from atomic_t to refcount_t (bsc#1093023).
- dm cache: fix race condition in the writeback mode overwrite_bio optimisation (bsc#1093023).
- dm cache: lift common migration preparation code to alloc_migration() (bsc#1093023).
- dm cache: pass cache structure to mode functions (bsc#1093023).
- dm cache: remove all obsolete writethrough-specific code (bsc#1093023).
- dm cache: remove usused deferred_cells member from struct cache (bsc#1093023).
- dm cache: simplify get_per_bio_data() by removing data_size argument (bsc#1093023).
- dm cache: submit writethrough writes in parallel to origin and cache (bsc#1093023).
- dm crypt: allow unaligned bv_offset (bsc#1093023).
- dm crypt: fix crash by adding missing check for auth key size (bsc#1093023).
- dm crypt: fix error return code in crypt_ctr() (bsc#1093023).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (bsc#1093023).
- dm crypt: limit the number of allocated pages (bsc#1093023).
- dm crypt: reject sector_size feature if device length is not aligned to it (bsc#1093023).
- dm crypt: remove BIOSET_NEED_RESCUER flag (bsc#1093023).
- dm crypt: wipe kernel key copy after IV initialization (bsc#1093023).
- dm flakey: check for null arg_name in parse_features() (bsc#1093023).
- dm integrity: allow unaligned bv_offset (bsc#1093023).
- dm integrity: count and display checksum failures (bsc#1093023).
- dm integrity: do not check integrity for failed read operations (bsc#1093023).
- dm integrity: do not store cipher request on the stack (bsc#1093023).
- dm integrity: fail early if required HMAC key is not available (bsc#1093023).
- dm integrity: make blk_integrity_profile structure const (bsc#1093023).
- dm integrity: optimize writing dm-bufio buffers that are partially changed (bsc#1093023).
- dm integrity: use init_completion instead of COMPLETION_INITIALIZER_ONSTACK (bsc#1093023).
- dm integrity: use kvfree for kvmalloc'd memory (bsc#1099918).
- dm io: remove BIOSET_NEED_RESCUER flag from bios bioset (bsc#1093023).
- dm ioctl: constify ioctl lookup table (bsc#1093023).
- dm log writes: add support for DAX (bsc#1093023).
- dm log writes: add support for inline data buffers (bsc#1093023).
- dm log writes: do not use all the cpu while waiting to log blocks (bsc#1093023).
- dm log writes: fix >512b sectorsize support (bsc#1093023).
- dm log writes: fix max length used for kstrndup (bsc#1093023).
- dm log writes: record metadata flag for better flags record (bsc#1093023).
- dm mpath: fix bio-based multipath queue_if_no_path handling (bsc#1099918).
- dm raid: add component device size checks to avoid runtime failure (bsc#1093023).
- dm raid: avoid passing array_in_sync variable to raid_status() callees (bsc#1093023).
- dm raid: bump target version to reflect numerous fixes (bsc#1093023).
- dm raid: consume sizes after md_finish_reshape() completes changing them (bsc#1093023).
- dm raid: correct resizing state relative to reshape space in ctr (bsc#1093023).
- dm raid: display a consistent copy of the MD status via raid_status() (bsc#1093023).
- dm raid: do not use 'const' in function return (bsc#1099918).
- dm raid: ensure 'a' chars during reshape (bsc#1093023).
- dm raid: fix deadlock caused by premature md_stop_writes() (bsc#1093023).
- dm raid: fix incorrect status output at the end of a 'recover' process (bsc#1093023).
- dm raid: fix incorrect sync_ratio when degraded (bsc#1093023).
- dm raid: fix nosync status (bsc#1093023).
- dm raid: fix panic when attempting to force a raid to sync (bsc#1093023).
- dm raid: fix parse_raid_params() variable range issue (bsc#1093023).
- dm raid: fix raid set size revalidation (bsc#1093023).
- dm raid: fix raid_resume() to keep raid set frozen as needed (bsc#1093023).
- dm raid: fix rs_get_progress() synchronization state/ratio (bsc#1093023).
- dm raid: make raid_sets symbol static (bsc#1093023).
- dm raid: simplify rs_get_progress() (bsc#1093023).
- dm raid: small cleanup and remove unsed 'struct raid_set' member (bsc#1093023).
- dm raid: stop keeping raid set frozen altogether (bsc#1093023).
- dm raid: use rs_is_raid*() (bsc#1093023).
- dm raid: validate current raid sets redundancy (bsc#1093023).
- dm rq: do not update rq partially in each ending bio (bsc#1093023).
- dm rq: make dm-sq requeuing behavior consistent with dm-mq behavior (bsc#1093023).
- dm space map metadata: use ARRAY_SIZE (bsc#1093023).
- dm stripe: get rid of a Variable Length Array (VLA) (bsc#1093023).
- dm table: fix regression from improper dm_dev_internal.count refcount_t conversion (bsc#1093023).
- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bsc#1093023).
- dm thin: fix trailing semicolon in __remap_and_issue_shared_cell (bsc#1093023).
- dm zoned: avoid triggering reclaim from inside dmz_map() (bsc#1099918).
- dm zoned: ignore last smaller runt zone (bsc#1093023).
- dm-crypt: do not clear bvec->bv_page in crypt_free_buffer_pages() (bsc#1093023).
- dm-crypt: do not mess with BIP_BLOCK_INTEGRITY (bsc#1093023).
- dm-raid: fix a race condition in request handling (bsc#1093023).
- dm: backfill missing calls to mutex_destroy() (bsc#1093023).
- dm: clear all discard attributes in queue_limits when discards are disabled (bsc#1093023).
- dm: convert DM printk macros to pr level macros (bsc#1099918).
- dm: convert dm_dev_internal.count from atomic_t to refcount_t (bsc#1093023).
- dm: convert table_device.count from atomic_t to refcount_t (bsc#1093023).
- dm: correctly handle chained bios in dec_pending() (bsc#1093023).
- dm: discard support requires all targets in a table support discards (bsc#1093023).
- dm: do not set 'discards_supported' in targets that do not need it (bsc#1093023).
- dm: ensure bio submission follows a depth-first tree walk (bsc#1093023).
- dm: ensure bio-based DM's bioset and io_pool support targets' maximum IOs (bsc#1093023).
- dm: fix __send_changing_extent_only() to send first bio and chain remainder (bsc#1093023).
- dm: fix comment above dm_accept_partial_bio (bsc#1093023).
- dm: fix printk() rate limiting code (bsc#1099918).
- dm: fix various targets to dm_register_target after module __init resources created (bsc#1093023).
- dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE (bsc#1093023).
- dm: move dm_table_destroy() to same header as dm_table_create() (bsc#1093023).
- dm: remove BIOSET_NEED_RESCUER based dm_offload infrastructure (bsc#1093023).
- dm: remove stale comment blocks (bsc#1093023).
- dm: remove unused 'num_write_bios' target interface (bsc#1093023).
- dm: remove unused macro DM_MOD_NAME_SIZE (bsc#1093023).
- dm: rename 'bio' member of dm_io structure to 'orig_bio' (bsc#1093023).
- dm: safely allocate multiple bioset bios (bsc#1093023).
- dm: set QUEUE_FLAG_DAX accordingly in dm_table_set_restrictions() (bsc#1093023).
- dm: simplify start of block stats accounting for bio-based (bsc#1093023).
- dm: small cleanup in dm_get_md() (bsc#1093023).
- dm: use bio_split() when splitting out the already processed bio (bsc#1099918).
- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bsc#1051510).
- dmaengine: at_xdmac: fix rare residue corruption (bsc#1051510).
- dmaengine: dmatest: fix container_of member in dmatest_callback (bsc#1051510).
- dmaengine: dmatest: move callback wait queue to thread context (bsc#1051510).
- dmaengine: dmatest: warn user when dma test times out (bsc#1051510).
- dmaengine: edma: Align the memcpy acnt array size with the transfer (bsc#1051510).
- dmaengine: ioat: Fix error handling path (bsc#1051510).
- dmaengine: jz4740: disable/unprepare clk if probe fails (bsc#1051510).
- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bsc#1051510).
- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bsc#1051510).
- dmaengine: ti-dma-crossbar: Fix possible race condition with dma_inuse (bsc#1051510).
- docs: disable KASLR when debugging kernel (bsc#1051510).
- dpaa_eth: increment the RX dropped counter when needed (networking-stable-18_03_28).
- dpaa_eth: remove duplicate increment of the tx_errors counter (networking-stable-18_03_28).
- dpaa_eth: remove duplicate initialization (networking-stable-18_03_28).
- drbd: Fix drbd_request_prepare() discard handling (bsc#1099918).
- driver core: Do not ignore class_dir_create_and_add() failure (bsc#1051510).
- driver core: Move device_links_purge() after bus_remove_device() (bsc#1099918).
- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (bsc#1046306).
- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bsc#1046306).
- drivers: net: bnx2x: use setup_timer() helper (bsc#1086323).
- drm/amd/powerplay: Fix enum mismatch (bsc#1051510).
- drm/amdgpu/sdma: fix mask in emit_pipeline_sync (bsc#1051510).
- drm/amdgpu/si: implement get/set pcie_lanes asic callback (bsc#1051510).
- drm/amdgpu: Add APU support in vi_set_uvd_clocks (bsc#1051510).
- drm/amdgpu: Add APU support in vi_set_vce_clocks (bsc#1051510).
- drm/amdgpu: Add an ATPX quirk for hybrid laptop (bsc#1051510).
- drm/amdgpu: Fix PCIe lane width calculation (bsc#1051510).
- drm/amdgpu: Fix always_valid bos multiple LRU insertions (bsc#1051510).
- drm/amdgpu: Fix deadlock on runtime suspend (bsc#1051510).
- drm/amdgpu: Use kvmalloc_array for allocating VRAM manager nodes array (bsc#1051510).
- drm/amdgpu: adjust timeout for ib_ring_tests(v2) (bsc#1051510).
- drm/amdgpu: disable GFX ring and disable PQ wptr in hw_fini (bsc#1051510).
- drm/amdgpu: set COMPUTE_PGM_RSRC1 for SGPR/VGPR clearing shaders (bsc#1051510).
- drm/amdkfd: fix clock counter retrieval for node without GPU (bsc#1051510).
- drm/armada: fix leak of crtc structure (bsc#1051510).
- drm/ast: Fixed 1280x800 Display Issue (bsc#1051510).
- drm/atmel-hlcdc: check stride values in the first plane (bsc#1051510).
- drm/atomic: Clean old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).
- drm/atomic: Clean private obj old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).
- drm/bridge: analogix dp: Fix runtime PM state in get_modes() callback (bsc#1051510).
- drm/bridge: tc358767: do no fail on hi-res displays (bsc#1051510).
- drm/bridge: tc358767: filter out too high modes (bsc#1051510).
- drm/bridge: tc358767: fix 1-lane behavior (bsc#1051510).
- drm/bridge: tc358767: fix AUXDATAn registers access (bsc#1051510).
- drm/bridge: tc358767: fix DP0_MISC register set (bsc#1051510).
- drm/bridge: tc358767: fix timing calculations (bsc#1051510).
- drm/bridge: vga-dac: Fix edid memory leak (bsc#1051510).
- drm/dumb-buffers: Integer overflow in drm_mode_create_ioctl() (bsc#1051510).
- drm/exynos/dsi: mask frame-done interrupt (bsc#1051510).
- drm/exynos: Allow DRM_EXYNOS on s5pv210 (bsc#1051510).
- drm/exynos: Fix default value for zpos plane property (bsc#1051510).
- drm/exynos: fix comparison to bitshift when dealing with a mask (bsc#1051510).
- drm/exynos: g2d: use monotonic timestamps (bsc#1051510).
- drm/fsl-dcu: enable IRQ before drm_atomic_helper_resume() (bsc#1051510).
- drm/hisilicon: Ensure LDI regs are properly configured (bsc#1051510).
- drm/i915/audio: Fix audio detection issue on GLK (bsc#1051510).
- drm/i915/audio: set minimum CD clock to twice the BCLK (bsc#1095265).
- drm/i915/bios: filter out invalid DDC pins from VBT child devices (bsc#1051510).
- drm/i915/execlists: Use rmb() to order CSB reads (bsc#1051510).
- drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk (bsc#1051510).
- drm/i915/glk: Add MODULE_FIRMWARE for Geminilake (bsc#1095265).
- drm/i915/gvt: fix memory leak of a cmd_entry struct on error exit path (bsc#1051510).
- drm/i915/gvt: throw error on unhandled vfio ioctls (bsc#1051510).
- drm/i915/lvds: Move acpi lid notification registration to registration phase (bsc#1051510).
- drm/i915/psr: Chase psr.enabled only under the psr.lock (bsc#1051510).
- drm/i915/userptr: reject zero user_size (bsc#1051510).
- drm/i915: Adjust eDP's logical vco in a reliable place (bsc#1095265).
- drm/i915: Apply batch location restrictions before pinning (bsc#1051510).
- drm/i915: Call i915_perf_fini() on init_hw error unwind (bsc#1051510).
- drm/i915: Disable LVDS on Radiant P845 (bsc#1051510).
- drm/i915: Do no use kfree() to free a kmem_cache_alloc() return value (bsc#1051510).
- drm/i915: Do not request a bug report for unsafe module parameters (bsc#1051510).
- drm/i915: Enable display WA#1183 from its correct spot (bsc#1051510).
- drm/i915: Enable provoking vertex fix on Gen9 systems (bsc#1051510).
- drm/i915: Fix LSPCON TMDS output buffer enabling from low-power state (bsc#1051510).
- drm/i915: Fix context ban and hang accounting for client (bsc#1051510).
- drm/i915: Fix drm:intel_enable_lvds ERROR message in kernel log (bsc#1051510).
- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).
- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).
- drm/i915: Remove unbannable context spam from reset (bsc#1051510).
- drm/i915: Restore planes after load detection (bsc#1051510).
- drm/i915: Restore planes after load detection (bsc#1051510).
- drm/i915: Try GGTT mmapping whole object as partial (bsc#1051510).
- drm/imx: move arming of the vblank event to atomic_flush (bsc#1051510).
- drm/meson: Fix an un-handled error path in 'meson_drv_bind_master()' (bsc#1051510).
- drm/meson: Fix some error handling paths in 'meson_drv_bind_master()' (bsc#1051510).
- drm/meson: fix vsync buffer update (bsc#1051510).
- drm/msm/dsi: use correct enum in dsi_get_cmd_fmt (bsc#1051510).
- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1051510).
- drm/msm: do not deref error pointer in the msm_fbdev_create error path (bsc#1100209).
- drm/msm: fix leak in failed get_pages (bsc#1051510).
- drm/nouveau/bar/gf100: add config option to limit BAR2 to 16MiB (bsc#1095094).
- drm/nouveau/bios/iccsense: rails for power sensors have a mask of 0xf8 for version 0x10 (bsc#1095094).
- drm/nouveau/bios/init: add a new devinit script interpreter entry-point (bsc#1095094).
- drm/nouveau/bios/init: add or/link args separate from output path (bsc#1095094).
- drm/nouveau/bios/init: bump script offset to 32-bits (bsc#1095094).
- drm/nouveau/bios/init: remove internal use of nvbios_init.bios (bsc#1095094).
- drm/nouveau/bios/init: rename 'crtc' to 'head' (bsc#1095094).
- drm/nouveau/bios/init: rename nvbios_init() to nvbios_devinit() (bsc#1095094).
- drm/nouveau/bios/volt: Parse min and max for Version 0x40 (bsc#1095094).
- drm/nouveau/bios: Demote missing fp table message to NV_DEBUG (bsc#1095094).
- drm/nouveau/bl: fix backlight regression (bsc#1095094).
- drm/nouveau/devinit: use new devinit script interpreter entry-point (bsc#1095094).
- drm/nouveau/disp/dp: determine a failsafe link training rate (bsc#1095094).
- drm/nouveau/disp/dp: determine link bandwidth requirements from head state (bsc#1095094).
- drm/nouveau/disp/dp: no need for lt_state except during manual link training (bsc#1095094).
- drm/nouveau/disp/dp: only check for re-train when the link is active (bsc#1095094).
- drm/nouveau/disp/dp: remove DP_PWR method (bsc#1095094).
- drm/nouveau/disp/dp: store current link configuration in nvkm_ior (bsc#1095094).
- drm/nouveau/disp/dp: train link only when actively displaying an image (bsc#1095094).
- drm/nouveau/disp/dp: use cached link configuration when checking link status (bsc#1095094).
- drm/nouveau/disp/dp: use new devinit script interpreter entry-point (bsc#1095094).
- drm/nouveau/disp/g84-: Extend NVKM HDMI power control method to set InfoFrames (bsc#1095094).
- drm/nouveau/disp/g84-: port OR HDMI control to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/g84-gt200: Use supplied HDMI InfoFrames (bsc#1095094).
- drm/nouveau/disp/g94-: port OR DP drive setting control to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/g94-: port OR DP lane mapping to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/g94-: port OR DP link power control to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/g94-: port OR DP link setup to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/g94-: port OR DP training pattern control to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/gf119-: avoid creating non-existent heads (bsc#1095094).
- drm/nouveau/disp/gf119-: port OR DP VCPI control to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/gf119: Use supplied HDMI InfoFrames (bsc#1095094).
- drm/nouveau/disp/gf119: add missing drive vfunc ptr (bsc#1095094).
- drm/nouveau/disp/gk104-: Use supplied HDMI InfoFrames (bsc#1095094).
- drm/nouveau/disp/gm200-: allow non-identity mapping of SOR != macro links (bsc#1095094).
- drm/nouveau/disp/gt215-: port HDA ELD controls to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/gt215: Use supplied HDMI InfoFrames (bsc#1095094).
- drm/nouveau/disp/nv04: avoid creation of output paths (bsc#1095094).
- drm/nouveau/disp/nv50-: avoid creating ORs that are not present on HW (bsc#1095094).
- drm/nouveau/disp/nv50-: execute supervisor on its own workqueue (bsc#1095094).
- drm/nouveau/disp/nv50-: fetch head/OR state at beginning of supervisor (bsc#1095094).
- drm/nouveau/disp/nv50-: implement a common supervisor 1.0 (bsc#1095094).
- drm/nouveau/disp/nv50-: implement a common supervisor 2.0 (bsc#1095094).
- drm/nouveau/disp/nv50-: implement a common supervisor 2.1 (bsc#1095094).
- drm/nouveau/disp/nv50-: implement a common supervisor 2.2 (bsc#1095094).
- drm/nouveau/disp/nv50-: implement a common supervisor 3.0 (bsc#1095094).
- drm/nouveau/disp/nv50-: port OR manual sink detection to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/nv50-: port OR power state control to nvkm_ior (bsc#1095094).
- drm/nouveau/disp/nv50-gt21x: remove workaround for dp->tmds hotplug issues (bsc#1095094).
- drm/nouveau/disp: Add mechanism to convert HDMI InfoFrames to hardware format (bsc#1095094).
- drm/nouveau/disp: Silence DCB warnings (bsc#1095094).
- drm/nouveau/disp: add tv encoders to output resource mapping (bsc#1095094).
- drm/nouveau/disp: common implementation of scanoutpos method in nvkm_head (bsc#1095094).
- drm/nouveau/disp: delay output path / connector construction until oneinit() (bsc#1095094).
- drm/nouveau/disp: fork off some new hw-specific implementations (bsc#1095094).
- drm/nouveau/disp: identity-map display paths to output resources (bsc#1095094).
- drm/nouveau/disp: introduce acquire/release display path methods (bsc#1095094).
- drm/nouveau/disp: introduce input/output resource abstraction (bsc#1095094).
- drm/nouveau/disp: introduce object to track per-head functions/state (bsc#1095094).
- drm/nouveau/disp: move vblank_{get,put} methods into nvkm_head (bsc#1095094).
- drm/nouveau/disp: remove hw-specific customisation of output paths (bsc#1095094).
- drm/nouveau/disp: rename nvkm_output to nvkm_outp (bsc#1095094).
- drm/nouveau/disp: rename nvkm_output_dp to nvkm_dp (bsc#1095094).
- drm/nouveau/disp: s/nvkm_connector/nvkm_conn/ (bsc#1095094).
- drm/nouveau/disp: shuffle functions around (bsc#1095094).
- drm/nouveau/falcon: use a more reasonable msgqueue timeout value (bsc#1095094).
- drm/nouveau/fb/gf100-: zero mmu debug buffers (bsc#1095094).
- drm/nouveau/fb/ram/nv40-: use new devinit script interpreter entry-point (bsc#1095094).
- drm/nouveau/fbcon: fix oops without fbdev emulation (bsc#1094751).
- drm/nouveau/hwmon: Add config for all sensors and their settings (bsc#1095094).
- drm/nouveau/hwmon: Add nouveau_hwmon_ops structure with .is_visible/.read_string (bsc#1095094).
- drm/nouveau/hwmon: Change permissions to numeric (bsc#1095094).
- drm/nouveau/hwmon: Remove old code, add .write/.read operations (bsc#1095094).
- drm/nouveau/hwmon: expose the auto_point and pwm_min/max attrs (bsc#1095094).
- drm/nouveau/kms/nv04-nv40: improve overlay error detection, fix pitch setting (bsc#1095094).
- drm/nouveau/kms/nv04-nv40: prevent undisplayable framebuffers from creation (bsc#1095094).
- drm/nouveau/kms/nv04-nv4x: fix exposed format list (bsc#1095094).
- drm/nouveau/kms/nv04: use new devinit script interpreter entry-point (bsc#1095094).
- drm/nouveau/kms/nv10-nv40: add NV21 support to overlay (bsc#1095094).
- drm/nouveau/mc/gf100: add pmu to reset mask (bsc#1095094).
- drm/nouveau/mpeg: print more debug info when rejecting dma objects (bsc#1095094).
- drm/nouveau/pmu/fuc: do not use movw directly anymore (bsc#1051510).
- drm/nouveau/pmu/gt215-: abstract detection of whether reset is needed (bsc#1095094).
- drm/nouveau/pmu/gt215: fix reset (bsc#1095094).
- drm/nouveau/tegra: Do not leave GPU in reset (bsc#1095094).
- drm/nouveau/tegra: Skip manual unpowergating when not necessary (bsc#1095094).
- drm/nouveau/therm/gm200: Added (bsc#1095094).
- drm/nouveau/therm: fix spelling mistake on array thresolds (bsc#1095094).
- drm/nouveau/tmr: remove nvkm_timer_alarm_cancel() (bsc#1095094).
- drm/nouveau: Clean up nv50_head_atomic_check_mode() and fix blankus calculation (bsc#1095094).
- drm/nouveau: Convert nouveau to use new iterator macros, v2 (bsc#1095094).
- drm/nouveau: Drop drm_vblank_cleanup (bsc#1095094).
- drm/nouveau: Enable stereoscopic 3D output over HDMI (bsc#1095094).
- drm/nouveau: Fix deadlock in nv50_mstm_register_connector() (bsc#1051510).
- drm/nouveau: Fix deadlock on runtime suspend (bsc#1051510).
- drm/nouveau: Fix merge commit (bsc#1095094).
- drm/nouveau: Handle drm_atomic_helper_swap_state failure (bsc#1095094).
- drm/nouveau: Handle frame-packing mode geometry and timing effects (bsc#1095094).
- drm/nouveau: Pass mode-dependent AVI and Vendor HDMI InfoFrames to NVKM (bsc#1095094).
- drm/nouveau: Skip vga_fini on non-PCI device (bsc#1095094).
- drm/nouveau: Use the drm_driver.dumb_destroy default (bsc#1095094).
- drm/nouveau: silence suspend/resume debugging messages (bsc#1095094).
- drm/nouveau: use drm_for_each_connector_iter() (bsc#1095094).
- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bsc#1051510).
- drm/omap: fix possible NULL ref issue in tiler_reserve_2d (bsc#1051510).
- drm/omap: fix uninitialized ret variable (bsc#1051510).
- drm/omap: handle alloc failures in omap_connector (bsc#1051510).
- drm/omap: silence unititialized variable warning (bsc#1051510).
- drm/panel: simple: Fix the bus format for the Ontat panel (bsc#1051510).
- drm/psr: Fix missed entry in PSR setup time table (bsc#1051510).
- drm/qxl: Call qxl_bo_unref outside atomic context (bsc#1051510).
- drm/radeon: Fix PCIe lane width calculation (bsc#1051510).
- drm/radeon: Fix deadlock on runtime suspend (bsc#1051510).
- drm/radeon: add PX quirk for Asus K73TK (bsc#1051510).
- drm/radeon: make MacBook Pro d3_delay quirk more generic (bsc#1051510).
- drm/rockchip: Clear all interrupts before requesting the IRQ (bsc#1051510).
- drm/rockchip: Respect page offset for PRIME mmap calls (bsc#1051510).
- drm/rockchip: dw-mipi-dsi: fix possible un-balanced runtime PM enable (bsc#1051510).
- drm/sun4i: Fix dclk_set_phase (bsc#1051510).
- drm/sun4i: Fix error path handling (bsc#1051510).
- drm/tegra: Shutdown on driver unbind (bsc#1051510).
- drm/tilcdc: ensure nonatomic iowrite64 is not used (bsc#1051510).
- drm/vc4: Fix memory leak during BO teardown (bsc#1051510).
- drm/vc4: Fix scaling of uni-planar formats (bsc#1051510).
- drm/virtio: fix vq wait_event condition (bsc#1051510).
- drm/vmwgfx: Fix 32-bit VMW_PORT_HB_[IN|OUT] macros (bsc#1051510).
- drm/vmwgfx: Fix a buffer object leak (bsc#1051510).
- drm/vmwgfx: Set dmabuf_size when vmw_dmabuf_init is successful (bsc#1051510).
- drm/vmwgfx: Unpin the screen object backup buffer when not used (bsc#1051510).
- drm: Allow determining if current task is output poll worker (bsc#1051510).
- drm: Match sysfs name in link removal to link creation (bsc#1051510).
- drm: bridge: dw-hdmi: Fix overflow workaround for Amlogic Meson GX SoCs (bsc#1051510).
- drm: nouveau: remove dead code and pointless local lut storage (bsc#1095094).
- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen2 (bsc#1051510).
- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen3 (bsc#1051510).
- drm: set FMODE_UNSIGNED_OFFSET for drm files (bsc#1051510).
- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876).
- eCryptfs: do not pass up plaintext names when using filename encryption (bsc#1052766).
- earlycon: Use a pointer table to fix __earlycon_table stride (bsc#1099918).
- efi/esrt: Use memunmap() instead of kfree() to free the remapping (bsc#1051510).
- emulex/benet: Constify *be_misconfig_evt_port_state (bsc#1086288).
- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282).
- ethernet: Use octal not symbolic permissions (bsc#1086288).
- ethtool: do not print warning for applications using legacy API (networking-stable-18_01_12).
- etnaviv: fix gem object list corruption (bsc#1051510).
- etnaviv: fix submit error path (bsc#1051510).
- ext4: add bounds checking to ext4_xattr_find_entry() (bsc#1052766).
- ext4: do not update checksum of new initialized bitmaps (bsc#1052766).
- ext4: eliminate sleep from shutdown ioctl (bsc#1052766).
- ext4: fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).
- ext4: fix offset overflow on 32-bit archs in ext4_iomap_begin() (bsc#1079747).
- ext4: fix unsupported feature message formatting (bsc#1098435).
- ext4: move call to ext4_error() into ext4_xattr_check_block() (bsc#1052766).
- ext4: pass -ESHUTDOWN code to jbd2 layer (bsc#1052766).
- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bsc#1052766).
- ext4: protect i_disksize update by i_data_sem in direct write path (bsc#1052766).
- ext4: set h_journal if there is a failure starting a reserved handle (bsc#1052766).
- ext4: shutdown should not prevent get_write_access (bsc#1052766).
- extcon: intel-cht-wc: Set direction and drv flags for V5 boost GPIO (bsc#1051510).
- f2fs: avoid hungtask when GC encrypted block if io_bits is set (bsc#1052766).
- f2fs: expose some sectors to user in inline data or dentry case (bsc#1052766).
- f2fs: fix a panic caused by NULL flush_cmd_control (bsc#1086400).
- f2fs: fix heap mode to reset it back (bsc#1052766).
- f2fs: fix to clear CP_TRIMMED_FLAG (bsc#1052766).
- f2fs: fix to wake up all sleeping flusher (bsc#1099918).
- fanotify: fix logic of events on child (bsc#1052766).
- fbdev: controlfb: Add missing modes to fix out of bounds access (bsc#1051510).
- fealnx: Fix building error on MIPS (networking-stable-17_11_20).
- fib_semantics: Do not match route with mismatching tclassid (networking-stable-18_03_07).
- firewire-ohci: work around oversized DMA reads on JMicron controllers (bsc#1051510).
- firmware: add helper to unregister pm ops (bsc#1085937).
- firmware: always enable the reboot notifier (bsc#1085937).
- firmware: dmi_scan: Fix UUID length safety check (bsc#1051510).
- firmware: dmi_scan: Fix handling of empty DMI strings (bsc#1051510).
- firmware: fix capturing errors on fw_cache_init() on early init (bsc#1085937).
- firmware: fix checking for return values for fw_add_devm_name() (bsc#1051510).
- firmware: fix detecting error on register_reboot_notifier() (bsc#1085936).
- firmware: move kill_requests_without_uevent() up above (bsc#1085937).
- firmware: provide helpers for registering the syfs loader (bsc#1085937).
- firmware: share fw fallback killing on reboot/suspend (bsc#1085937).
- flow_dissector: properly cap thoff field (networking-stable-18_01_28).
- fs/aio: Add explicit RCU grace period when freeing kioctx (bsc#1088722).
- fs/aio: Use RCU accessors for kioctx_table->table[] (bsc#1088722).
- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099142).
- fs/fat/inode.c: fix sb_rdonly() change (bsc#1052766).
- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bsc#1052766).
- fsnotify: Fix fsnotify_mark_connector race (bsc#1052766).
- fsnotify: Hide kABI changes in fsnotify_mark_connector (bsc#1052766).
- ftrace: Fix selftest goto location on error (bsc#1099918).
- fuse: fix READDIRPLUS skipping an entry (bsc#1088690).
- geneve: Fix function matching VNI and tunnel ID on big-endian (bsc#1051510).
- geneve: fix fill_info when link down (bsc#1051510).
- gfs2: Fix debugfs glocks dump (bsc#1052766).
- gpio: No NULL owner (bsc#1051510).
- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bsc#1051510).
- gpio: davinci: Assign first bank regs for unbanked case (bsc#1051510).
- gpio: fix 'gpio-line-names' property retrieval (bsc#1051510).
- gpio: fix aspeed_gpio unmask irq (bsc#1051510).
- gpio: fix error path in lineevent_create (bsc#1051510).
- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- gpio: label descriptors using the device name (bsc#1051510).
- gpio: stmpe: i2c transfer are forbiden in atomic context (bsc#1051510).
- gpioib: do not free unrequested descriptors (bsc#1051510).
- gpu: ipu-v3: pre: fix device node leak in ipu_pre_lookup_by_phandle (bsc#1051510).
- gpu: ipu-v3: prg: avoid possible array underflow (bsc#1051510).
- gpu: ipu-v3: prg: fix device node leak in ipu_prg_lookup_by_phandle (bsc#1051510).
- hdlc_ppp: carrier detect ok, do not turn off negotiation (networking-stable-18_03_07).
- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1094420).
- hwmon: (ina2xx) Fix access to uninitialized mutex (bsc#1051510).
- hwmon: (ina2xx) Make calibration register value fixed (bsc#1051510).
- hwmon: (jc42) optionally try to disable the SMBUS timeout (bsc#1051510).
- hwmon: (nct6775) Fix writing pwmX_mode (bsc#1051510).
- hwmon: (pmbus/adm1275) Accept negative page register values (bsc#1051510).
- hwmon: (pmbus/max8688) Accept negative page register values (bsc#1051510).
- hwtracing: stm: fix build error on some arches (bsc#1051510).
- i2c: designware: fix poll-after-enable regression (bsc#1051510).
- i2c: i801: Restore configuration at shutdown (bsc#1051510).
- i2c: i801: Save register SMBSLVCMD value only once (bsc#1051510).
- i2c: ismt: Separate I2C block read from SMBus block read (bsc#1051510).
- i2c: mv64xxx: Apply errata delay only in standard mode (bsc#1051510).
- i2c: pmcmsp: fix error return from master_xfer (bsc#1051510).
- i2c: pmcmsp: return message count on master_xfer success (bsc#1051510).
- i2c: viperboard: return message count on master_xfer success (bsc#1051510).
- i40e: Close client on suspend and restore client MSIx on resume (bsc#1088821).
- i40e: Do not allow use more TC queue pairs than MSI-X vectors exist (bsc#1094978).
- i40e: Fix attach VF to VM issue (bsc#1056658 bsc#1056662).
- i40e: Fix the number of queues available to be mapped for use (bsc#1094978).
- i40e: program fragmented IPv4 filter input set (bsc#1056658 bsc#1056662).
- i40evf: Do not schedule reset_task when device is being removed (bsc#1056658 bsc#1056662).
- i40evf: do not rely on netif_running() outside rtnl_lock() (bsc#1056658 bsc#1056662).
- i40evf: ignore link up if not running (bsc#1056658 bsc#1056662).
- i40iw: Zero-out consumer key on allocate stag for FMR (bsc#1058659).
- ibmvnic: Check CRQ command return codes (bsc#1094840).
- ibmvnic: Create separate initialization routine for resets (bsc#1094840).
- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).
- ibmvnic: Fix partial success login retries (bsc#1094840).
- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).
- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).
- ibmvnic: Handle error case when setting link state (bsc#1094840).
- ibmvnic: Introduce active CRQ state (bsc#1094840).
- ibmvnic: Introduce hard reset recovery (bsc#1094840).
- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).
- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).
- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).
- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).
- ide: Make ide_cdrom_prep_fs() initialize the sense buffer pointer (bsc#1099918).
- ide: ide-atapi: fix compile error with defining macro DEBUG (bsc#1099918).
- ide:ide-cd: fix kernel panic resulting from missing scsi_req_init (bsc#1099918).
- idr: fix invalid ptr dereference on item delete (bsc#1051510).
- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (networking-stable-18_03_28).
- igb: Allow to remove administratively set MAC on VFs (bsc#1056651).
- igb: Clear TXSTMP when ptp_tx_work() is timeout (bsc#1056651).
- igb: Fix a test with HWTSTAMP_TX_ON (bsc#1056651 bsc#1056643).
- iio: ABI: Fix name of timestamp sysfs file (bsc#1051510).
- iio: ad7793: Fix the serial interface reset (bsc#1051510).
- iio: ad7793: implement IIO_CHAN_INFO_SAMP_FREQ (bsc#1051510).
- iio: ad_sigma_delta: Implement a dedicated reset function (bsc#1051510).
- iio: adc/accel: Fix up module licenses (bsc#1051510).
- iio: adc: cpcap: fix incorrect validation (bsc#1051510).
- iio: adc: mcp320x: Fix oops on module unload (bsc#1051510).
- iio: adc: mcp320x: Fix readout of negative voltages (bsc#1051510).
- iio: adc: meson-saradc: fix the bit_idx of the adc_en clock (bsc#1051510).
- iio: adc: stm32: fix scan of multiple channels with DMA (bsc#1051510).
- iio: adc: ti-ads1015: add 10% to conversion wait time (bsc#1051510).
- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of 'twl4030_madc_probe()' (bsc#1051510).
- iio: adc: twl4030: Fix an error handling path in 'twl4030_madc_probe()' (bsc#1051510).
- iio: adis_lib: Initialize trigger before requesting interrupt (bsc#1051510).
- iio: buffer: check if a buffer has been set up when poll is called (bsc#1051510).
- iio: buffer: fix the function signature to match implementation (bsc#1051510).
- iio: core: Return error for failed read_reg (bsc#1051510).
- iio: fix kernel-doc build errors (bsc#1051510).
- iio: health: max30102: Add power enable parameter to get_temp function (bsc#1051510).
- iio: health: max30102: Temperature should be in milli Celsius (bsc#1051510).
- iio: imu: st_lsm6dsx: fix endianness in st_lsm6dsx_read_oneshot() (bsc#1051510).
- iio: st_pressure: st_accel: Initialise sensor platform data properly (bsc#1051510).
- iio: st_pressure: st_accel: pass correct platform data to init (bsc#1051510).
- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).
- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).
- iio: trigger: stm32-timer: preset shouldn't be buffered (bsc#1051510).
- iio:buffer: make length types match kfifo types (bsc#1051510).
- iio:kfifo_buf: check for uint overflow (bsc#1051510).
- ima: Fallback to the builtin hash algorithm (bsc#1091686).
- infiniband: drop unknown function from core_priv.h (bsc#1046306).
- init: fix false positives in W+X checking (bsc#1093721).
- initial support (display-only) for GP108 (bsc#1095094).
- intel_th: Use correct device when freeing buffers (bsc#1051510).
- iommu/amd: Take into account that alloc_dev_data() may return NULL (bsc#975772).
- iommu/vt-d: Clear pasid table entry when memory unbound (bsc#1087214).
- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).
- iov_iter: fix memory leak in pipe_get_pages_alloc() (bsc#1092710).
- iov_iter: fix return type of __pipe_get_pages() (bsc#1092710).
- ip6_gre: better validate user provided tunnel names (networking-stable-18_04_10).
- ip6_gre: fix device features for ioctl setup (networking-stable-17_12_31).
- ip6_gre: init dev->mtu and dev->hard_header_len correctly (networking-stable-18_01_28).
- ip6_gre: ip6gre_tap device should keep dst (networking-stable-17_10_09).
- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (networking-stable-17_11_14).
- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (networking-stable-17_10_09).
- ip6_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).
- ip6_tunnel: disable dst caching if tunnel is dual-stack (networking-stable-18_01_12).
- ip6_tunnel: do not allow loading ip6_tunnel if ipv6 is disabled in cmdline (networking-stable-17_10_09).
- ip6_vti: adjust vti mtu according to mtu of lower device (bsc#1082869).
- ip6mr: fix stale iterator (networking-stable-18_02_06).
- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (git-fixes).
- ip_gre: fix IFLA_MTU ignored on NEWLINK (bsc#1076830).
- ip_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).
- ipip: only increase err_count for some certain type icmp in ipip_err (networking-stable-17_11_14).
- ipv4: Fix use-after-free when flushing FIB tables (networking-stable-17_12_31).
- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (networking-stable-18_01_28).
- ipv4: fix fnhe usage by non-cached routes (networking-stable-18_05_15).
- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (networking-stable-18_05_15).
- ipv4: igmp: guard against silly MTU values (bsc#1082869).
- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (networking-stable-18_03_07).
- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (git-fixes).
- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (networking-stable-18_04_26).
- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (networking-stable-18_03_28).
- ipv6: fix udpv6 sendmsg crash caused by too small MTU (networking-stable-18_01_28).
- ipv6: flowlabel: do not leave opt->tot_len with garbage (networking-stable-17_11_14).
- ipv6: mcast: better catch silly mtu values (networking-stable-17_12_31).
- ipv6: old_dport should be a __be16 in __ip6_datagram_connect() (networking-stable-18_03_28).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- ipv6: sit: better validate user provided tunnel names (networking-stable-18_04_10).
- ipv6: sr: fix NULL pointer dereference in seg6_do_srh_encap()- v4 pkts (git-fixes).
- ipv6: sr: fix NULL pointer dereference when setting encap source address (networking-stable-18_03_28).
- ipv6: sr: fix TLVs not being copied using setsockopt (networking-stable-18_01_12).
- ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state (networking-stable-18_03_28).
- ipv6: sr: fix seg6 encap performances with TSO enabled (networking-stable-18_04_10).
- ipv6: the entire IPv6 header chain must fit the first fragment (networking-stable-18_04_10).
- irqchip/gic-v3-its: Ensure nr_ites >= nr_lpis (bsc#1098401).
- isdn: eicon: fix a missing-check bug (bsc#1051510).
- iw_cxgb4: Atomically flush per QP HW CQEs (bsc#1046543).
- iw_cxgb4: Fix an error handling path in 'c4iw_get_dma_mr()' (bsc#1064802 bsc#1066129).
- iw_cxgb4: print mapped ports correctly (bsc#1046543).
- iwlmvm: tdls: Check TDLS channel switch support (bsc#1051510).
- iwlwifi: add a bunch of new 9000 PCI IDs (1051510).
- iwlwifi: add shared clock PHY config flag for some devices (bsc#1051510).
- iwlwifi: avoid collecting firmware dump if not loaded (bsc#1051510).
- iwlwifi: fix non_shared_ant for 9000 devices (bsc#1051510).
- iwlwifi: fw: harden page loading code (bsc#1051510).
- iwlwifi: mvm: Correctly set IGTK for AP (bsc#1051510).
- iwlwifi: mvm: Correctly set the tid for mcast queue (bsc#1051510).
- iwlwifi: mvm: Direct multicast frames to the correct station (bsc#1051510).
- iwlwifi: mvm: Fix channel switch for count 0 and 1 (bsc#1051510).
- iwlwifi: mvm: Increase session protection time after CS (bsc#1051510).
- iwlwifi: mvm: always init rs with 20mhz bandwidth rates (bsc#1051510).
- iwlwifi: mvm: clear tx queue id when unreserving aggregation queue (bsc#1051510).
- iwlwifi: mvm: do not warn in queue sync on RF-kill (bsc#1051510).
- iwlwifi: mvm: fix 'failed to remove key' message (bsc#1051510).
- iwlwifi: mvm: fix IBSS for devices that support station type API (bsc#1051510).
- iwlwifi: mvm: fix TSO with highly fragmented SKBs (bsc#1051510).
- iwlwifi: mvm: fix TX of CCMP 256 (bsc#1051510).
- iwlwifi: mvm: fix array out of bounds reference (bsc#1051510).
- iwlwifi: mvm: fix assert 0x2B00 on older FWs (bsc#1051510).
- iwlwifi: mvm: fix error checking for multi/broadcast sta (bsc#1051510).
- iwlwifi: mvm: fix race in queue notification wait (bsc#1051510).
- iwlwifi: mvm: fix security bug in PN checking (bsc#1051510).
- iwlwifi: mvm: honor the max_amsdu_subframes limit (bsc#1051510).
- iwlwifi: mvm: make sure internal station has a valid id (bsc#1051510).
- iwlwifi: mvm: remove DQA non-STA client mode special case (bsc#1051510).
- iwlwifi: mvm: set the correct tid when we flush the MCAST sta (bsc#1051510).
- iwlwifi: pcie: compare with number of IRQs requested for, not number of CPUs (bsc#1051510).
- ixgbe: do not set RXDCTL.RLPML for 82599 (bsc#1056657).
- ixgbe: prevent ptp_rx_hang from running when in FILTER_ALL mode (bsc#1056657 bsc#1056653).
- jbd2: if the journal is aborted then do not allow update of the log tail (bsc#1052766).
- jffs2_kill_sb(): deal with failed allocations (bsc#1052766).
- kABI: protect ife_tlv_meta_decode (kabi).
- kABI: protect struct cstate (kabi).
- kABI: protect struct ipv6_pinfo (kabi).
- kABI: protect tap_create_cdev (kabi).
- kabi protect struct acpi_nfit_desc (bsc#1091424).
- kabi/severities: Ignore kABI incompatibility for meson drm The symbols are used only between meson modules, so mostly internal.
- kabi/severities: Ignore removed bugs.c symbols The second wave of SSBD patches drops those symbols and we can ignore them from kABI because nothing external should use them - they were exported only for kvm.
- kabi/severities: add 'drivers/md/bcache/* PASS' for above change.
- kabi/severities: add nvdimm internal symbols to kabi ignore list
- kabi: add struct bpf_map back (References: bsc#1098425).
- kcm: lock lower socket in kcm_attach (networking-stable-18_03_28).
- kconfig: Avoid format overflow warning from GCC 8.1 (bsc#1051510).
- kconfig: Do not leak main menus during parsing (bsc#1051510).
- kconfig: Fix automatic menu creation mem leak (bsc#1051510).
- kconfig: Fix expr_free() E_NOT leak (bsc#1051510).
- kernel-binary: also default klp_symbols to 0 here.
- kernel-binary: pass ARCH= to kernel build Recent kernel does not save CONFIG_64BIT so it has to be specified by arch.
- kernel-binary: pass MAKE_ARGS to install script as well.
- kernel-{binary,docs}.spec sort dependencies.
- kernel/acct.c: fix the acct->needcheck check in check_free_space() (Git-fixes).
- kernel/async.c: revert 'async: simplify lowest_in_progress()' (Git-fixes).
- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bsc#1051510).
- kernel/relay.c: revert 'kernel/relay.c: fix potential memory leak' (Git-fixes).
- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (Git-fixes).
- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (Git-fixes).
- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (Git-fixes).
- kexec: export PG_swapbacked to VMCOREINFO (bsc#1088354).
- kexec_file: do not add extra alignment to efi memmap (bsc#1089268).
- klp_symbols: make --klp-symbols argument semantic sane It selects build of klp symbols and defaults to off
- kmod: fix wait on recursive loop (bsc#1099792).
- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).
- kmod: throttle kmod thread limit (bsc#1099792).
- kobject: do not use WARN for registration failures (bsc#1051510).
- kvm: Introduce nopvspin kernel parameter (bsc#1056427).
- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).
- l2tp: check sockaddr length in pppol2tp_connect() (networking-stable-18_04_26).
- l2tp: do not accept arbitrary sockets (bsc#1076830).
- lan78xx: Crash in lan78xx_writ_reg (Workqueue: events lan78xx_deferred_multicast_write) (networking-stable-18_04_10).
- leds: pm8058: Silence pointer to integer size warning (bsc#1051510).
- lib/kobject: Join string literals back (bsc#1051510).
- lib/string_helpers: Add missed declaration of struct task_struct (bsc#1099918).
- lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly (bsc#1051510).
- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bsc#1051510).
- libata: Blacklist some Sandisk SSDs for NCQ (bsc#1051510).
- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bsc#1051510).
- libata: blacklist Micron 500IT SSD with MU01 firmware (bsc#1051510).
- libata: zpodd: make arrays cdb static, reduces object code size (bsc#1051510).
- libata: zpodd: small read overflow in eject_tray() (bsc#1051510).
- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).
- libceph: adding missing message types to ceph_msg_type_name() (bsc#1089115).
- libceph: fix misjudgement of maximum monitor number (bsc#1089115).
- libceph: reschedule a tick in finish_hunting() (bsc#1089115).
- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).
- libceph: validate con->state at the top of try_write() (bsc#1089115).
- libnvdimm, btt: add a couple of missing kernel-doc lines (bsc#1087210).
- libnvdimm, btt: clean up warning and error messages (bsc#1087205).
- libnvdimm, btt: fix format string warnings (bsc#1087205).
- libnvdimm, dimm: handle EACCES failures from label reads ().
- libnvdimm, label: change min label storage size per UEFI 2.7 (bsc#1091666).
- libnvdimm, namespace: use a safe lookup for dimm device name (bsc#1095321).
- libnvdimm, nfit: fix persistence domain reporting (bsc#1091424).
- libnvdimm, pmem: Add sysfs notifications to badblocks ().
- libnvdimm, pmem: Do not flush power-fail protected CPU caches (bsc#1091424).
- libnvdimm, pmem: Unconditionally deep flush on *sync (bsc#1091424).
- libnvdimm, region, pmem: fix 'badblocks' sysfs_get_dirent() reference lifetime ().
- libnvdimm, region: hide persistence_domain when unknown (bsc#1091424).
- libnvdimm: expose platform persistence attribute for nd_region (bsc#1091424).
- libnvdimm: re-enable deep flush for pmem devices via fsync() (bsc#1091424).
- llc: better deal with too small mtu (networking-stable-18_05_15).
- llc: fix NULL pointer deref for SOCK_ZAPPED (networking-stable-18_04_26).
- llc: hold llc_sap before release_sock() (networking-stable-18_04_26).
- lock_parent() needs to recheck if dentry got __dentry_kill'ed under it (bsc#1052766).
- locking/atomics, dm-integrity: Convert ACCESS_ONCE() to READ_ONCE()/WRITE_ONCE() (bsc#1093023).
- locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns to READ_ONCE()/WRITE_ONCE() (bsc#1093023).
- locking/qspinlock: Ensure node is initialised before updating prev->next (bsc#1050549).
- locking/qspinlock: Ensure node->count is updated before initialising node (bsc#1050549).
- locking: Remove smp_read_barrier_depends() from queued_spin_lock_slowpath() (bsc#1050549).
- loop: handle short DIO reads (bsc#1052766).
- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bsc#1051510).
- mac80211: Adjust SAE authentication timeout (bsc#1051510).
- mac80211: Do not disconnect on invalid operating class (bsc#1051510).
- mac80211: Fix condition validating WMM IE (bsc#1051510).
- mac80211: Fix sending ADDBA response for an ongoing session (bsc#1051510).
- mac80211: Fix setting TX power on monitor interfaces (bsc#1051510).
- mac80211: drop frames with unexpected DS bits from fast-rx to slow path (bsc#1051510).
- mac80211: mesh: fix wrong mesh TTL offset calculation (bsc#1051510).
- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bsc#1051510).
- mac80211: use timeout from the AddBA response instead of the request (bsc#1051510).
- macros.kernel-source: Fix building non-x86 KMPs
- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.
- macros.kernel-source: ignore errors when using make to print kernel release There is no way to handle the errors anyway and including the error into package version does not give good results.
- macvlan: filter out unsupported feature flags (networking-stable-18_03_28).
- macvlan: fix memory hole in macvlan_dev (bsc#1099918).
- macvlan: remove unused fields in struct macvlan_dev (bsc#1099918).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush sequence (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix mask used in CMPL_START_ADDR_VALUE() (bsc#1051510).
- mailbox: mailbox-test: do not rely on rx_buffer content to signal data ready (bsc#1051510).
- mbcache: initialize entry->e_referenced in mb_cache_entry_create() (bsc#1052766).
- md-cluster: choose correct label when clustered layout is not supported (bsc#1093023).
- md-cluster: do not update recovery_offset for faulty device (bsc#1093023).
- md-cluster: make function cluster_check_sync_size static (bsc#1093023).
- md-multipath: Use seq_putc() in multipath_status() (bsc#1093023).
- md/bitmap: clear BITMAP_WRITE_ERROR bit before writing it to sb (bsc#1093023).
- md/bitmap: copy correct data for bitmap super (bsc#1093023).
- md/bitmap: revert a patch (bsc#1093023).
- md/r5cache: call mddev_lock/unlock() in r5c_journal_mode_show (bsc#1093023).
- md/r5cache: fix io_unit handling in r5l_log_endio() (bsc#1093023).
- md/r5cache: move mddev_lock() out of r5c_journal_mode_set() (bsc#1093023).
- md/r5cache: print more info of log recovery (bsc#1093023).
- md/raid0: attach correct cgroup info in bio (bsc#1093023).
- md/raid1,raid10: silence warning about wait-within-wait (bsc#1093023).
- md/raid1/10: add missed blk plug (bsc#1093023).
- md/raid1: Fix trailing semicolon (bsc#1093023).
- md/raid1: exit sync request if MD_RECOVERY_INTR is set (bsc#1093023).
- md/raid1: fix NULL pointer dereference (bsc#1093023).
- md/raid5: cap worker count (bsc#1093023).
- md/raid5: correct degraded calculation in raid5_error (bsc#1093023).
- md/raid5: simplify uninitialization of shrinker (bsc#1093023).
- md: Delete gendisk before cleaning up the request queue (bsc#1093023).
- md: allow metadata update while suspending (bsc#1093023).
- md: always hold reconfig_mutex when calling mddev_suspend() (bsc#1093023).
- md: be cautious about using ->curr_resync_completed for ->recovery_offset (bsc#1093023).
- md: do not call bitmap_create() while array is quiesced (bsc#1093023).
- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (bsc#1093023).
- md: document lifetime of internal rdev pointer (bsc#1093023).
- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1093023).
- md: fix a race condition for flush request handling (bsc#1093023).
- md: fix deadlock error in recent patch (bsc#1093023).
- md: fix two problems with setting the 're-add' device state (bsc#1098176).
- md: forbid a RAID5 from having both a bitmap and a journal (bsc#1093023).
- md: free unused memory after bitmap resize (bsc#1093023).
- md: limit mdstat resync progress to max_sectors (bsc#1093023).
- md: move suspend_hi/lo handling into core md code (bsc#1093023).
- md: only allow remove_and_add_spares when no sync_thread running (bsc#1093023).
- md: raid10: remove VLAIS (bsc#1093023).
- md: raid10: remove a couple of redundant variables and initializations (bsc#1093023).
- md: raid5: avoid string overflow warning (bsc#1093023).
- md: release allocated bitset sync_set (bsc#1093023).
- md: remove redundant variable q (bsc#1093023).
- md: remove special meaning of ->quiesce(.., 2) (bsc#1093023).
- md: rename some drivers/md/ files to have an 'md-' prefix (bsc#1093023).
- md: replace seq_release_private with seq_release (bsc#1093023).
- md: separate request handling (bsc#1093023).
- md: use TASK_IDLE instead of blocking signals (bsc#1093023).
- md: use lockdep_assert_held (bsc#1093023).
- md: use mddev_suspend/resume instead of ->quiesce() (bsc#1093023).
- media: atomisp_fops.c: disable atomisp_compat_ioctl32 (bsc#1051510).
- media: au0828: add VIDEO_V4L2 dependency (bsc#1051510).
- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bsc#1051510).
- media: cx23885: Override 888 ImpactVCBe crystal frequency (bsc#1051510).
- media: cx23885: Set subdev host data to clk_freq pointer (bsc#1051510).
- media: dmxdev: fix error code for invalid ioctls (bsc#1051510).
- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bsc#1051510).
- media: em28xx: Add Hauppauge SoloHD/DualHD bulk models (bsc#1051510).
- media: em28xx: USB bulk packet size fix (bsc#1051510).
- media: lgdt3306a: Fix a double kfree on i2c device remove (bsc#1051510).
- media: lgdt3306a: Fix module count mismatch on usb unplug (bsc#1051510).
- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).
- media: uvcvideo: Support realtek's UVC 1.5 device (bsc#1099109).
- media: v4l2-compat-ioctl32: do not oops on overlay (bsc#1051510).
- media: v4l2-compat-ioctl32: prevent go past max size (bsc#1051510).
- media: videobuf2-core: do not go out of the buffer range (bsc#1051510).
- media: vivid: check if the cec_adapter is valid (bsc#1051510).
- mei: me: add cannon point device ids ().
- mei: me: add cannon point device ids for 4th device ().
- mei: remove dev_err message on an unsupported ioctl (bsc#1051510).
- mfd: cros ec: spi: Do not send first message too soon (bsc#1051510).
- mfd: intel-lpss: Fix Intel Cannon Lake LPSS I2C input clock (bsc#1051510).
- mfd: intel-lpss: Program REMAP register in PIO mode (bsc#1051510).
- mkspec: only build docs for default variant kernel.
- mlxsw: spectrum: Disable MAC learning for ovs port (networking-stable-17_12_31).
- mlxsw: spectrum: Forbid linking to devices that have uppers FIX (stable-fixes).
- mlxsw: spectrum: Prevent mirred-related crash on removal (networking-stable-17_10_09).
- mlxsw: spectrum: Relax sanity checks during enslavement (networking-stable-18_01_12).
- mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic (networking-stable-18_03_28).
- mlxsw: spectrum_router: Do not log an error on missing neighbor (networking-stable-18_01_28).
- mlxsw: spectrum_router: Fix NULL pointer deref (networking-stable-18_01_12).
- mlxsw: spectrum_router: Fix error path in mlxsw_sp_vr_create (networking-stable-18_03_07).
- mlxsw: spectrum_router: Simplify a piece of code (networking-stable-18_01_12).
- mlxsw: spectrum_switchdev: Check success of FDB add operation (networking-stable-18_03_07).
- mm, oom_reaper: skip mm structs with mmu notifiers (bsc#1099918).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- mm, percpu: add support for __GFP_NOWARN flag (bsc#1089753).
- mm, slab: reschedule cache_reap() on the same CPU (VM Functionality, bsc#1097796).
- mm, swap: fix false error message in __swp_swapcount() (VM Functionality, bsc#1098043).
- mm, swap: fix race between swap count continuation operations (VM Functionality, bsc#1097373). mm, swap: fix race between swap count continuation operations - KABI fix (VM Functionality, bsc#1097373).
- mm, thp: do not cause memcg oom for thp (bnc#1089663).
- mm/fadvise: discard partial page if endbyte is also EOF (bsc#1052766).
- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bsc#1052766).
- mm/huge_memory.c: __split_huge_page() use atomic ClearPageDirty() (VM Functionality, bsc#1097800).
- mm/khugepaged.c: convert VM_BUG_ON() to collapse fail (VM Functionality, bsc#1097468).
- mm/ksm.c: fix inconsistent accounting of zero pages (VM Functionality, bsc#1097780).
- mm/mempolicy.c: avoid use uninitialized preferred_node (VM Functionality, bsc#1097465).
- mm/page_owner: fix recursion bug after changing skip entries (VM Functionality, bsc#1097472).
- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (bsc#1078248).
- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (bsc#1078248).
- mm/pkeys: Add an empty arch_pkeys_enabled() (bsc#1078248).
- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (bsc#1078248).
- mm/shmem: do not wait for lock_page() in shmem_unused_huge_shrink() (bnc#1089667).
- mm/thp: do not wait for lock_page() in deferred_split_scan() (VM Functionality, bsc#1097470).
- mm: Fix memory size alignment in devm_memremap_pages_release() (VM Functionality, bsc#1097439).
- mm: fix device-dax pud write-faults triggered by get_user_pages() (bsc#1052766).
- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#971975 VM -- git fixes).
- mmc: dw_mmc: exynos: fix the suspend/resume issue for exynos5433 (bsc#1051510).
- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1051510).
- mmc: sdhci-iproc: add SDHCI_QUIRK2_HOST_OFF_CARD_ON for cygnus (bsc#1051510).
- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bsc#1051510).
- mmc: sdhci-iproc: remove hard coded mmc cap 1.8v (bsc#1051510).
- mmc: sdhci-pci: Fix voltage switch for some Intel host controllers (bsc#1051510).
- mmc: sdhci-pci: Only do AMD tuning for HS200 (bsc#1051510).
- mq-deadline: Enable auto-loading when built as module (bsc#1099918).
- mremap: Remove LATENCY_LIMIT from mremap to reduce the number of TLB shootdowns (bnc#1095115).
- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).
- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bsc#1099918).
- mtd: nand: fsl_ifc: Fix eccstat array overflow for IFC ver >= 2.0.0 (bsc#1099918).
- mtd: partitions: add helper for deleting partition (bsc#1099918).
- mtd: partitions: remove sysfs files when deleting all master's partitions (bsc#1099918).
- mtd: ubi: wl: Fix error return code in ubi_wl_init() (bsc#1051510).
- mwifiex: pcie: tighten a check in mwifiex_pcie_process_event_ready() (bsc#1051510).
- n_tty: Access echo_* variables carefully (bsc#1051510).
- n_tty: Fix stall at n_tty_receive_char_special() (bsc#1051510).
- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1094825).
- nbd: do not start req until after the dead connection logic (bsc#1099918).
- nbd: fix -ERESTARTSYS handling (bsc#1099918).
- nbd: fix nbd device deletion (bsc#1099918).
- nbd: fix return value in error handling path (bsc#1099918).
- nbd: wait uninterruptible for the dead timeout (bsc#1099918).
- net sched actions: fix refcnt leak in skbmod (networking-stable-18_05_15).
- net sched actions: return explicit error when tunnel_key mode is not specified (bsc#1056787).
- net/ipv6: Fix route leaking between VRFs (networking-stable-18_04_10).
- net/ipv6: Increment OUTxxx counters after netfilter hook (networking-stable-18_04_10).
- net/iucv: Free memory obtained by kzalloc (networking-stable-18_03_28).
- net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()' (networking-stable-18_05_15).
- net/mlx4_en: Verify coalescing parameters are in range (networking-stable-18_05_15).
- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (networking-stable-18_05_15).
- net/mlx5: Eliminate query xsrq dead code (bsc#1046303).
- net/mlx5: Fix build break when CONFIG_SMP=n (bsc#1046303).
- net/mlx5: Fix mlx5_get_vector_affinity function (bsc#1046303).
- net/mlx5e: Allow offloading ipv4 header re-write for icmp (bsc#1046303).
- net/mlx5e: Do not reset Receive Queue params on every type change (bsc#1046303).
- net/mlx5e: Err if asked to offload TC match on frag being first (networking-stable-18_05_15).
- net/mlx5e: Fixed sleeping inside atomic context (bsc#1046303).
- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1046303).
- net/mlx5e: TX, Use correct counter in dma_map error flow (networking-stable-18_05_15).
- net/sched: cls_u32: fix cls_u32 on filter replace (networking-stable-18_03_07).
- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bsc#1056787).
- net/sched: fix NULL dereference in the error path of tunnel_key_init() (bsc#1056787).
- net/sched: fix NULL dereference on the error path of tcf_skbmod_init() (bsc#1056787).
- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (networking-stable-17_11_20).
- net/unix: do not show information about sockets from other namespaces (networking-stable-17_11_14).
- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bsc#1087092).
- net: Allow neigh contructor functions ability to modify the primary_key (networking-stable-18_01_28).
- net: Fix hlist corruptions in inet_evict_bucket() (networking-stable-18_03_28).
- net: Only honor ifindex in IP_PKTINFO if non-0 (networking-stable-18_03_28).
- net: Set sk_prot_creator when cloning sockets to the right proto (networking-stable-17_10_09).
- net: af_packet: fix race in PACKET_{R|T}X_RING (networking-stable-18_04_26).
- net: bonding: Fix transmit load balancing in balance-alb mode if specified by sysfs (networking-stable-17_10_09).
- net: bonding: fix tlb_dynamic_lb default value (networking-stable-17_10_09).
- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (networking-stable-17_12_31).
- net: bridge: fix returning of vlan range op errors (networking-stable-17_11_14).
- net: core: fix module type in sock_diag_bind (networking-stable-18_01_12).
- net: dsa: bcm_sf2: Clear IDDQ_GLOBAL_PWR bit for PHY (networking-stable-17_12_31).
- net: dsa: check master device before put (networking-stable-17_11_14).
- net: dsa: mv88e6xxx: lock mutex when freeing IRQs (networking-stable-17_10_09).
- net: emac: Fix napi poll list corruption (networking-stable-17_10_09).
- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (networking-stable-18_03_28).
- net: ethernet: sun: niu set correct packet size in skb (networking-stable-18_05_15).
- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (networking-stable-18_03_28).
- net: ethernet: ti: cpsw: fix net watchdog timeout (networking-stable-18_03_07).
- net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode (networking-stable-18_05_15).
- net: ethernet: ti: cpsw: fix tx vlan priority mapping (networking-stable-18_04_26).
- net: ethtool: Add missing kernel doc for FEC parameters (bsc#1046540).
- net: fec: Fix unbalanced PM runtime calls (networking-stable-18_03_28).
- net: fec: defer probe if regulator is not ready (networking-stable-18_01_12).
- net: fec: free/restore resource in related probe error pathes (networking-stable-18_01_12).
- net: fec: restore dev_id in the cases of probe error (networking-stable-18_01_12).
- net: fec: unmap the xmit buffer that are not transferred by DMA (networking-stable-17_12_31).
- net: fix deadlock while clearing neighbor proxy table (networking-stable-18_04_26).
- net: fix possible out-of-bound read in skb_network_protocol() (networking-stable-18_04_10).
- net: fool proof dev_valid_name() (networking-stable-18_04_10).
- net: igmp: Use correct source address on IGMPv3 reports (networking-stable-17_12_31).
- net: igmp: add a missing rcu locking section (git-fixes).
- net: igmp: fix source address check for IGMPv3 reports (git-fixes).
- net: ipv4: avoid unused variable warning for sysctl (git-fixes).
- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (networking-stable-18_03_07).
- net: ipv6: keep sk status consistent after datagram connect failure (networking-stable-18_03_28).
- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (networking-stable-17_12_31).
- net: phy: Fix mask value write on gmii2rgmii converter speed register (networking-stable-17_10_09).
- net: phy: Tell caller result of phy_change() (networking-stable-18_03_28).
- net: phy: fix phy_start to consider PHY_IGNORE_INTERRUPT (networking-stable-18_03_07).
- net: phy: marvell: Limit 88m1101 autoneg errata to 88E1145 as well (networking-stable-17_12_31).
- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (networking-stable-17_12_31).
- net: qcom/emac: specify the correct size when mapping a DMA buffer (networking-stable-17_10_09).
- net: qdisc_pkt_len_init() should be more robust (networking-stable-18_01_28).
- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319).
- net: realtek: r8169: implement set_link_ksettings() (networking-stable-17_12_12).
- net: reevalulate autoflowlabel setting after sysctl setting (networking-stable-17_12_31).
- net: remove hlist_nulls_add_tail_rcu() (networking-stable-17_12_12).
- net: sched: fix error path in tcf_proto_create() when modules are not configured (networking-stable-18_05_15).
- net: sched: ife: check on metadata length (networking-stable-18_04_26).
- net: sched: ife: handle malformed tlv length (networking-stable-18_04_26).
- net: sched: ife: signal not finding metaid (networking-stable-18_04_26).
- net: sched: report if filter is too large to dump (networking-stable-18_03_07).
- net: stmmac: enable EEE in MII, GMII or RGMII only (networking-stable-18_01_12).
- net: support compat 64-bit time in {s,g}etsockopt (networking-stable-18_05_15).
- net: systemport: Correct IPG length settings (networking-stable-17_11_20).
- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (networking-stable-18_03_28).
- net: tcp: close sock if net namespace is exiting (networking-stable-18_01_28).
- net: validate attribute sizes in neigh_dump_table() (networking-stable-18_04_26).
- net: vrf: Add support for sends to local broadcast address (networking-stable-18_01_28).
- net_sched: fq: take care of throttled flows before reuse (networking-stable-18_05_15).
- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (networking-stable-17_11_20).
- netfilter: use skb_to_full_sk in ip6_route_me_harder (bsc#1076830).
- netlink: avoid a double skb free in genlmsg_mcast() (git-fixes).
- netlink: do not proceed if dump's start() errs (networking-stable-17_10_09).
- netlink: do not set cb_running if dump's start() errs (networking-stable-17_11_14).
- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (networking-stable-18_03_07).
- netlink: extack needs to be reset each time through loop (networking-stable-18_01_28).
- netlink: make sure nladdr has correct size in netlink_connect() (networking-stable-18_04_10).
- netlink: put module reference if dump start fails (git-fixes).
- netlink: reset extack earlier in netlink_rcv_skb (networking-stable-18_01_28).
- nfit-test: Add platform cap support from ACPI 6.2a to test (bsc#1091424).
- nfit: skip region registration for incomplete control regions (bsc#1091666).
- nfp: use full 40 bits of the NSP buffer address (bsc#1055968).
- nl80211: relax ht operation checks for mesh (bsc#1051510).
- nubus: Avoid array underflow and overflow (bsc#1099918).
- nubus: Fix up header split (bsc#1099918).
- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098706).
- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098706).
- nvme-fabrics: centralize discovery controller defaults (bsc#1098706).
- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098706).
- nvme-fabrics: handle the admin-only case properly in nvmf_check_ready (bsc#1098706).
- nvme-fabrics: refactor queue ready check (bsc#1098706).
- nvme-fabrics: remove unnecessary controller subnqn validation (bsc#1098706).
- nvme-fc: change controllers first connect to use reconnect path (bsc#1098706).
- nvme-fc: fix nulling of queue data on reconnect (bsc#1098706).
- nvme-fc: release io queues to allow fast fail (bsc#1098706).
- nvme-fc: remove reinit_request routine (bsc#1098706).
- nvme-fc: remove setting DNR on exception conditions (bsc#1098706).
- nvme-multipath: fix sysfs dangerously created links (bsc#1096529).
- nvme-rdma: Fix command completion race at error recovery (bsc#1099041).
- nvme-rdma: correctly check for target keyed sgl support (bsc#1099041).
- nvme-rdma: do not override opts->queue_size (bsc#1099041).
- nvme-rdma: fix error flow during mapping request data (bsc#1099041).
- nvme-rdma: fix possible double free condition when failing to create a controller (bsc#1099041).
- nvme/multipath: Fix multipath disabled naming collisions (bsc#1098706).
- nvme: Set integrity flag for user passthrough commands (bsc#1098706).
- nvme: Skip checking heads without namespaces (bsc#1098706).
- nvme: Use admin command effects for admin commands (bsc#1098706).
- nvme: add quirk to force medium priority for SQ creation ().
- nvme: allow duplicate controller if prior controller being deleted (bsc#1098706).
- nvme: check return value of init_srcu_struct function (bsc#1098706).
- nvme: do not send keep-alives to the discovery controller ().
- nvme: expand nvmf_check_if_ready checks (bsc#1098706).
- nvme: fix NULL pointer dereference in nvme_init_subsystem (bsc#1098706).
- nvme: fix extended data LBA supported setting ().
- nvme: fix lockdep warning in nvme_mpath_clear_current_path ().
- nvme: fix potential memory leak in option parsing (bsc#1098706).
- nvme: move init of keep_alive work item to controller initialization (bsc#1098706).
- nvme: target: fix buffer overflow ().
- nvmet-fc: increase LS buffer count per fc port (bsc#1098706).
- nvmet: fix space padding in serial number ().
- nvmet: switch loopback target state to connecting when resetting (bsc#1098706).
- objtool, perf: Fix GCC 8 -Wrestrict error (Fix gcc 8 restrict error).
- ocfs2/acl: use 'ip_xattr_sem' to protect getting extended attribute (bsc#1052766).
- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1052766).
- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1052766).
- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bsc#1052766).
- of: overlay: validate offset from property fixups (bsc#1051510).
- of: platform: stop accessing invalid dev in of_platform_device_destroy (bsc#1051510).
- of: unittest: for strings, account for trailing \0 in property length field (bsc#1051510).
- omapdrm: panel: fix compatible vendor string for td028ttec1 (bsc#1051510).
- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (networking-stable-18_05_15).
- ovl: Put upperdentry if ovl_check_origin() fails (bsc#1088704).
- ovl: Return -ENOMEM if an allocation fails ovl_lookup() (bsc#1096065).
- ovl: fix failure to fsync lower dir (bsc#108871).
- ovl: fix lookup with middle layer opaque dir and absolute path redirects (bsc#1090605).
- p54: do not unregister leds when they are not initialized (bsc#1051510).
- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bsc#1051510).
- partitions/msdos: Unable to mount UFS 44bsd partitions (bsc#1051510).
- pinctrl/amd: Fix build dependency on pinmux code (bsc#1051510).
- pinctrl/amd: save pin registers over suspend/resume (bsc#1051510).
- pinctrl: adi2: Fix Kconfig build problem (bsc#1051510).
- pinctrl: armada-37xx: Fix direction_output() callback behavior (bsc#1051510).
- pinctrl: artpec6: dt: add missing pin group uart5nocts (bsc#1051510).
- pinctrl: baytrail: Enable glitch filter for GPIOs used as interrupts (bsc#1051510).
- pinctrl: denverton: Fix UART2 RTS pin mode (bsc#1051510).
- pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- pinctrl: rockchip: enable clock when reading pin direction register (bsc#1051510).
- pinctrl: samsung: Fix NULL pointer exception on external interrupts on S3C24xx (bsc#1051510).
- pinctrl: samsung: Fix invalid register offset used for Exynos5433 external interrupts (bsc#1051510).
- pinctrl: sh-pfc: r8a7795-es1: Fix MOD_SEL1 bit[25:24] to 0x3 when using STP_ISEN_1_D (bsc#1051510).
- pinctrl: sh-pfc: r8a7796: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510).
- pinctrl: sunxi: Fix A64 UART mux value (bsc#1051510).
- pinctrl: sunxi: Fix A80 interrupt pin bank (bsc#1051510).
- pinctrl: sx150x: Add a static gpio/pinctrl pin range mapping (bsc#1051510).
- pinctrl: sx150x: Register pinctrl before adding the gpiochip (bsc#1051510).
- pinctrl: sx150x: Unregister the pinctrl on release (bsc#1051510).
- pipe: fix off-by-one error when checking buffer limits (bsc#1051510).
- pktcdvd: Fix a recently introduced NULL pointer dereference (bsc#1099918).
- pktcdvd: Fix pkt_setup_dev() error path (bsc#1099918).
- platform/chrome: Use proper protocol transfer function (bsc#1051510).
- platform/chrome: cros_ec_lpc: remove redundant pointer request (bsc#1051510).
- platform/x86: asus-wireless: Fix NULL pointer dereference (bsc#1051510).
- platform/x86: asus-wmi: Fix NULL pointer dereference (bsc#1051510).
- platform/x86: fujitsu-laptop: Support Lifebook U7x7 hotkeys (bsc#1087284).
- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).
- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, too (bsc#1098626).
- platform/x86: thinkpad_acpi: suppress warning about palm detection (bsc#1051510).
- power: supply: ab8500_charger: Bail out in case of error in 'ab8500_charger_init_hw_registers()' (bsc#1051510).
- power: supply: ab8500_charger: Fix an error handling path (bsc#1051510).
- power: supply: axp288_charger: Properly stop work on probe-error / remove (bsc#1051510).
- powerpc/64s/idle: avoid sync for KVM state when waking from idle (bsc#1061840).
- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).
- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).
- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).
- powerpc/kvm: Fix guest boot failure on Power9 since DAWR changes (bsc#1061840).
- powerpc/kvm: Fix lockups when running KVM guests on Power8 (bsc#1061840).
- powerpc/livepatch: Fix KABI breaker in stacktrace.c (bsc#1071995 bsc#1072856 bsc#1087458 bsc#1089664 bsc#1089669).
- powerpc/livepatch: Fix build error with kprobes disabled (bsc#1071995).
- powerpc/mm: Fix thread_pkey_regs_init() (bsc#1078248, git-fixes).
- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc1056686).
- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc1056686).
- powerpc/perf: Fix kernel address leak via sampling registers (bsc1056686).
- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc1056686).
- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bsc1056686).
- powerpc/perf: Prevent kernel address leak via perf_get_data_addr() (bsc1056686).
- powerpc/perf: fix bug references.
- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (bsc#1078248, git-fixes).
- powerpc/pkeys: Drop private VM_PKEY definitions (bsc#1078248).
- powerpc/ptrace: Fix enforcement of DAWR constraints (bsc#1099918).
- powerpc/xmon: Also setup debugger hooks when single-stepping (bsc#1072829).
- powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths (bsc#1088804).
- powerpc64/ftrace: Add helpers to hard disable ftrace (bsc#1088804).
- powerpc64/ftrace: Delay enabling ftrace on secondary cpus (bsc#1088804).
- powerpc64/ftrace: Disable ftrace during hotplug (bsc#1088804).
- powerpc64/ftrace: Disable ftrace during kvm guest entry/exit (bsc#1088804).
- powerpc64/ftrace: Rearrange #ifdef sections in ftrace.h (bsc#1088804).
- powerpc64/ftrace: Use the generic version of ftrace_replace_code() (bsc#1088804).
- powerpc64/kexec: Hard disable ftrace before switching to the new kernel (bsc#1088804).
- powerpc64/module: Tighten detection of mcount call sites with -mprofile-kernel (bsc#1088804).
- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).
- ppp: avoid loop in xmit recursion detection code (networking-stable-18_03_28).
- ppp: fix race in ppp device destruction (networking-stable-17_11_14).
- ppp: prevent unregistered channels from connecting to PPP units (networking-stable-18_03_07).
- ppp: unlock all_ppp_mutex before registering device (networking-stable-18_01_28).
- pppoe: check sockaddr length in pppoe_connect() (networking-stable-18_04_26).
- pppoe: take ->needed_headroom of lower device into account on xmit (networking-stable-18_01_28).
- pptp: remove a buggy dst release in pptp_connect() (networking-stable-18_04_10).
- printk: fix possible reuse of va_list variable (bsc#1100602).
- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).
- ptr_ring: add barriers (networking-stable-17_12_31).
- pty: cancel pty slave port buf's work in tty_release (bsc#1051510).
- pwm: lpss: platform: Save/restore the ctrl register over a suspend/resume (bsc#1051510).
- pwm: rcar: Fix a condition to prevent mismatch value setting to duty (bsc#1051510).
- pwm: stmpe: Fix wrong register offset for hwpwm=2 case (bsc#1051510).
- qed: Fix l2 initializations over iWARP personality (bsc#1050536 bsc#1050545).
- qed: Fix non TCP packets should be dropped on iWARP ll2 connection (bsc#1050545).
- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1050536 bsc#1050545).
- qed: Use after free in qed_rdma_free() (bsc#1050536 bsc#1050545).
- qede: Fix gfp flags sent to rdma event node allocation (bsc#1050538 bsc#1050545).
- qede: Fix qedr link update (bsc#1050538 bsc#1050545).
- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).
- qmi_wwan: Add missing skb_reset_mac_header-call (networking-stable-17_11_20).
- qmi_wwan: Add support for Quectel EP06 (networking-stable-18_02_06).
- qmi_wwan: do not steal interfaces from class drivers (bsc#1092888).
- r8169: fix powering up RTL8168h (bsc#1051510).
- r8169: fix setting driver_data after register_netdev (bsc#1051510).
- radeon: hide pointless #warning when compile testing (bsc#1051510).
- radix tree test suite: add item_delete_rcu() (bsc#1095467).
- radix tree test suite: fix compilation issue (bsc#1095467).
- radix tree test suite: fix mapshift build target (bsc#1095467).
- radix tree test suite: multi-order iteration race (bsc#1095467).
- radix tree: fix multi-order iteration race (bsc#1095467).
- raid10: check bio in r10buf_pool_free to void NULL pointer dereference (bsc#1098174).
- raid1: copy write hint from master bio to behind bio (bsc#1093023).
- raid1: prevent freeze_array/wait_all_barriers deadlock (bsc#1093023).
- raid1: remove obsolete code in raid1_write_request (bsc#1093023).
- raid5-ppl: PPL support for disks with write-back cache enabled (bsc#1093023).
- raid5-ppl: fix handling flush requests (bsc#1093023).
- raid5: Set R5_Expanded on parity devices as well as data (bsc#1093023).
- raid5: remove raid5_build_block (bsc#1093023).
- raid: remove tile specific raid6 implementation (bsc#1093023).
- random: crng_reseed() should lock the crng instance that it is modifying (bsc#1051510).
- random: use a different mixing algorithm for add_device_randomness() (bsc#1051510).
- random: use a tighter cap in credit_entropy_bits_safe() (bsc#1051510).
- rbd: use GFP_NOIO for parent stat and data requests (bsc#1093728).
- rds: Incorrect reference counting in TCP socket creation (bsc#1076830).
- rds: MP-RDS may use an invalid c_path (networking-stable-18_04_13).
- rds: do not leak kernel memory to user land (networking-stable-18_05_15).
- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099029).
- regulator: cpcap: Fix standby mode (bsc#1051510).
- regulator: gpio: Fix some error handling paths in 'gpio_regulator_probe()' (bsc#1091960).
- regulator: of: Add a missing 'of_node_put()' in an error handling path of 'of_regulator_match()' (bsc#1051510).
- resource: fix integer overflow at reallocation (bsc#1086739).
- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).
- rfkill: gpio: fix memory leak in probe error path (bsc#1051510).
- rhashtable: Fix rhlist duplicates insertion (bsc#1051510).
- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).
- rocker: fix possible null pointer dereference in rocker_router_fib_event_work (networking-stable-18_02_06).
- route: check sysctl_fib_multipath_use_neigh earlier than hash (networking-stable-18_04_10).
- rpm/config.sh: Fixup BUGZILLA_PRODUCT variable
- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.
- rpm/kernel-source.changes.old: Add pre-SLE15 history (bsc#1098995).
- rpm/modules.fips include module list from dracut
- rt2x00: do not pause queue unconditionally on error path (bsc#1051510).
- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bsc#1051510).
- rtc: hctosys: Ensure system time does not overflow time_t (bsc#1051510).
- rtc: pcf8563: fix output clock rate (bsc#1051510).
- rtc: pl031: make interrupt optional (bsc#1051510).
- rtc: snvs: Fix usage of snvs_rtc_enable (bsc#1051510).
- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bsc#1051510).
- rtl8187: Fix NULL pointer dereference in priv->conf_mutex (bsc#1051510).
- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bsc#1051510).
- rxrpc: Fix send in rxrpc_send_data_packet() (networking-stable-18_03_07).
- s390/archrandom: Reconsider s390 arch random implementation (bnc#1096753, LTC#168037).
- s390/archrandom: Rework arch random implementation (bnc#1096753, LTC#168037).
- s390/cio: update chpid descriptor after resource accessibility event (bnc#1093148, LTC#167307).
- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096753, LTC#168037).
- s390/dasd: fix IO error for newly defined devices (bnc#1093148, LTC#167307).
- s390/qdio: do not merge ERROR output buffers (bsc#1099715).
- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1096753, LTC#168037).
- s390/qeth: do not dump control cmd twice (bsc#1099715).
- s390/qeth: fix IPA command submission race (networking-stable-18_03_07).
- s390/qeth: fix IPA command submission race (bsc#1099715).
- s390/qeth: fix MAC address update sequence (bnc#1093148, LTC#167307).
- s390/qeth: fix overestimated count of buffer elements (bsc#1099715).
- s390/qeth: fix overestimated count of buffer elements (networking-stable-18_03_07).
- s390/qeth: free netdevice when removing a card (networking-stable-18_03_28).
- s390/qeth: free netdevice when removing a card (bsc#1099715).
- s390/qeth: lock read device while queueing next buffer (bsc#1099715).
- s390/qeth: lock read device while queueing next buffer (networking-stable-18_03_28).
- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093148, LTC#167307).
- s390/qeth: use Read device to query hypervisor for MAC (bsc#1061024).
- s390/qeth: when thread completes, wake up all waiters (bsc#1099715).
- s390/qeth: when thread completes, wake up all waiters (networking-stable-18_03_28).
- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1093148, LTC#167307).
- s390/zcrypt: Fix CCA and EP11 CPRB processing failure memory leak (bnc#1096753, LTC#168037).
- sch_netem: fix skb leak in netem_enqueue() (networking-stable-18_03_28).
- sched/numa: Stagger NUMA balancing scan periods for new threads (Automatic NUMA Balancing ()).
- sched: Make resched_cpu() unconditional (Git-fixes).
- sched: Stop resched_cpu() from sending IPIs to offline CPUs (Git-fixes).
- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (Git-fixes).
- scripts/git_sort/git_sort.py:
- scripts/git_sort/git_sort.py: add Viro's vfs git
- scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte() (bsc#1099918).
- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961).
- scsi: ipr: new IOASC update (bsc#1097961).
- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088866).
- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1088866).
- scsi: lpfc: Comment cleanup regarding Broadcom copyright header (bsc#1088866).
- scsi: lpfc: Correct fw download error message (bsc#1088866).
- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088866).
- scsi: lpfc: Correct target queue depth application changes (bsc#1088866).
- scsi: lpfc: Driver NVME load fails when CPU cnt > WQ resource cnt (bsc#1088866).
- scsi: lpfc: Enhance log messages when reporting CQE errors (bsc#1088866).
- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088866).
- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1093290).
- scsi: lpfc: Fix Abort request WQ selection (bsc#1088866).
- scsi: lpfc: Fix MDS diagnostics failure (Rx andlt; Tx) (bsc#1088866).
- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088866).
- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088866).
- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1088866).
- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088866).
- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088866).
- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088866).
- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088866).
- scsi: lpfc: Fix port initialization failure (bsc#1093290).
- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1088866).
- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1088866).
- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1088866).
- scsi: lpfc: enhance LE data structure copies to hardware (bsc#1088866).
- scsi: lpfc: fix spelling mistakes: 'mabilbox' and 'maibox' (bsc#1088866).
- scsi: lpfc: update driver version to 12.0.0.2 (bsc#1088866).
- scsi: lpfc: update driver version to 12.0.0.3 (bsc#1088866).
- scsi: lpfc: update driver version to 12.0.0.4 (bsc#1088866).
- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084570).
- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084570).
- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084570).
- scsi: qla2xxx: Delete session for nport id change (bsc#1077338).
- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084570).
- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084570).
- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084570).
- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084570).
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1077338).
- scsi: qla2xxx: Remove nvme_done_list (bsc#1084570).
- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084570).
- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084570).
- scsi: qla2xxx: Return busy if rport going away (bsc#1084570).
- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084570).
- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084570).
- scsi: raid_class: Add 'JBOD' RAID level (bsc#1093023).
- scsi: sg: mitigate read/write abuse (bsc#1101296).
- scsi: target: fix crash with iscsi target and dvd (bsc#1099918).
- sctp: delay the authentication for the duplicated cookie-echo chunk (networking-stable-18_05_15).
- sctp: do not check port in sctp_inet6_cmp_addr (networking-stable-18_04_26).
- sctp: do not leak kernel memory to user space (networking-stable-18_04_10).
- sctp: do not retransmit upon FragNeeded if PMTU discovery is disabled (networking-stable-18_01_12).
- sctp: fix dst refcnt leak in sctp_v6_get_dst() (networking-stable-18_03_07).
- sctp: fix the handling of ICMP Frag Needed for too small MTUs (networking-stable-18_01_12).
- sctp: fix the issue that the cookie-ack with auth can't get processed (networking-stable-18_05_15).
- sctp: full support for ipv6 ip_nonlocal_bind and IP_FREEBIND (networking-stable-17_11_14).
- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (git-fixes).
- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (networking-stable-17_10_09).
- sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg (networking-stable-18_05_15).
- sctp: reset owner sk for data chunks on out queues when migrating a sock (networking-stable-17_11_14).
- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (networking-stable-18_04_10).
- sctp: use right member as the param of list_for_each_entry (git-fixes).
- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (networking-stable-18_05_15).
- sdhci: Advertise 2.0v supply on SDIO host controller (bsc#1051510).
- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bsc#1051510).
- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bsc#1051510).
- selinux: skip bounded transition processing if the policy isn't loaded (bsc#1051510).
- serdev: fix memleak on module unload (bsc#1051510).
- serdev: fix receive_buf return value when no callback (bsc#1051510).
- serdev: fix registration of second slave (bsc#1051510).
- serdev: ttyport: add missing open() error handling (bsc#1051510).
- serdev: ttyport: add missing receive_buf sanity checks (bsc#1051510).
- serdev: ttyport: enforce tty-driver open() requirement (bsc#1051510).
- serdev: ttyport: fix NULL-deref on hangup (bsc#1051510).
- serdev: ttyport: fix tty locking in close (bsc#1051510).
- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bsc#1051510).
- serial: 8250: omap: Fix idling of clocks for unused uarts (bsc#1051510).
- serial: 8250_dw: Disable clock on error (bsc#1051510).
- serial: 8250_fintek: Fix finding base_port with activated SuperIO (bsc#1051510).
- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bsc#1051510).
- serial: altera: ensure port->regshift is honored consistently (bsc#1051510).
- serial: arc_uart: Fix out-of-bounds access through DT alias (bsc#1051510).
- serial: core: mark port as initialized in autoconfig (bsc#1051510).
- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bsc#1051510).
- serial: imx: Fix out-of-bounds access through serial port index (bsc#1051510).
- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bsc#1051510).
- serial: mxs-auart: Fix out-of-bounds access through serial port index (bsc#1051510).
- serial: omap: Fix EFR write on RTS deassertion (bsc#1051510).
- serial: samsung: Fix out-of-bounds access through serial port index (bsc#1051510).
- serial: samsung: fix maxburst parameter for DMA transactions (bsc#1051510).
- serial: sh-sci: Fix out-of-bounds access through DT alias (bsc#1051510).
- serial: sh-sci: Stop using printk format %pCr (bsc#1051510).
- serial: sh-sci: prevent lockup on full TTY buffers (bsc#1051510).
- serial: xuartps: Fix out-of-bounds access through DT alias (bsc#1051510).
- sget(): handle failures of register_shrinker() (bsc#1052766).
- sh_eth: fix SH7757 GEther initialization (networking-stable-18_01_12).
- sh_eth: fix TSU resource handling (networking-stable-18_01_12).
- skbuff: Fix not waking applications when errors are enqueued (networking-stable-18_03_28).
- sky2: Increase D3 delay to sky2 stops working after suspend (bsc#1051510).
- slip: Check if rstate is initialized before uncompressing (networking-stable-18_04_13).
- sock: free skb in skb_complete_tx_timestamp on error (networking-stable-17_12_31).
- soreuseport: fix mem leak in reuseport_add_sock() (networking-stable-18_02_06).
- spi: Fix scatterlist elements size in spi_map_buf (bsc#1051510).
- spi: a3700: Fix clk prescaling for coefficient over 15 (bsc#1051510).
- spi: a3700: Return correct value on timeout detection (bsc#1051510).
- spi: armada-3700: Fix failing commands with quad-SPI (bsc#1051510).
- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bsc#1051510).
- spi: atmel: init FIFOs before spi enable (bsc#1051510).
- spi: bcm-qspi: Fix use after free in bcm_qspi_probe() in error path (bsc#1051510).
- spi: imx: do not access registers while clocks disabled (bsc#1051510).
- spi: sh-msiof: Fix DMA transfer size check (bsc#1051510).
- spi: spi-axi: fix potential use-after-free after deregistration (bsc#1051510).
- spi: sun4i: disable clocks in the remove function (bsc#1051510).
- spi: sun6i: disable/unprepare clocks on remove (bsc#1051510).
- spi: xilinx: Detect stall with Unknown commands (bsc#1051510).
- srcu: Provide ordering for CPU not involved in grace period (bsc#1052766).
- staging: bcm2835-audio: Release resources on module_exit() (bsc#1051510).
- staging: comedi: fix comedi_nsamples_left (bsc#1051510).
- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bsc#1051510).
- staging: iio: ad5933: switch buffer mode to software (bsc#1051510).
- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bsc#1051510).
- staging: iio: adc: ad7192: fix external frequency setting (bsc#1051510).
- staging: rtl8192u: return -ENOMEM on failed allocation of priv->oldaddr (bsc#1051510).
- staging: vchiq_2835_arm: Fix NULL ptr dereference in free_pagelist (bsc#1051510).
- staging: wilc1000: Fix bssid buffer offset in Txq (bsc#1051510).
- stm class: Fix a use-after-free (bsc#1051510).
- stm class: Use vmalloc for the master map (bsc#1051510).
- stmmac: reset last TSO segment size after device open (networking-stable-17_12_12).
- strparser: Do not call mod_delayed_work with a timeout of LONG_MAX (networking-stable-18_04_26).
- strparser: Fix incorrect strp->need_bytes value (networking-stable-18_04_26).
- strparser: Fix sign of err codes (networking-stable-18_04_10).
- sunrpc: remove incorrect HMAC request initialization (bsc#1051510).
- supported.conf: Remove external flag from iwlwifi modules (bsc#1093273)
- supported.conf: fix folder of the driver module
- swap: divide-by-zero when zero length swap file on ssd (bsc#1051510).
- swiotlb: suppress warning when __GFP_NOWARN is set (bsc#1051510).
- tap: reference to KVA of an unloaded module causes kernel panic (networking-stable-17_11_14).
- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).
- tcp: do not read out-of-bounds opsize (networking-stable-18_04_26).
- tcp: fix data delivery rate (networking-stable-17_10_09).
- tcp: ignore Fast Open on repair mode (networking-stable-18_05_15).
- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (networking-stable-18_04_26).
- tcp: release sk_frag.page in tcp_disconnect (networking-stable-18_02_06).
- tcp: revert F-RTO extension to detect more spurious timeouts (networking-stable-18_03_07).
- tcp: revert F-RTO middle-box workaround (bsc#1076830).
- tcp_bbr: fix to zero idle_restart only upon S/ACKed data (networking-stable-18_05_15).
- tcp_bbr: record 'full bw reached' decision in new full_bw_reached bit (networking-stable-17_12_31).
- tcp_bbr: reset full pipe detection on loss recovery undo (networking-stable-17_12_31).
- tcp_bbr: reset long-term bandwidth sampling on loss recovery undo (networking-stable-17_12_31).
- tcp_nv: fix division by zero in tcpnv_acked() (networking-stable-17_11_20).
- team: Fix double free in error path (networking-stable-18_03_28).
- team: avoid adding twice the same option to the event list (networking-stable-18_04_26).
- team: fix netconsole setup over team (networking-stable-18_04_26).
- team: move dev_mc_sync after master_upper_dev_link in team_port_add (networking-stable-18_04_10).
- tee: check shm references are consistent in offset/size (bsc#1051510).
- tee: shm: fix use-after-free via temporarily dropped reference (bsc#1051510).
- test_firmware: fix missing unlock on error in config_num_requests_store() (bsc#1051510).
- test_firmware: fix setting old custom fw path back on exit (bsc#1051510).
- test_firmware: fix setting old custom fw path back on exit, second try (bsc#1051510).
- tg3: APE heartbeat changes (bsc#1086286).
- tg3: Add Macronix NVRAM support (bsc#1086286).
- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286).
- tg3: prevent scheduling while atomic splat (bsc#1086286).
- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bsc#1051510).
- thermal: bcm2835: Stop using printk format %pCr (bsc#1051510).
- thermal: enable broadcom menu for arm64 bcm2835 (bsc#1095573).
- thermal: exynos: Propagate error value from tmu_read() (bsc#1051510).
- thermal: exynos: Reading temperature makes sense only when TMU is turned on (bsc#1051510).
- thermal: imx: Fix race condition in imx_thermal_probe() (bsc#1051510).
- thermal: int3400_thermal: fix error handling in int3400_thermal_probe() (bsc#1051510).
- thermal: int3403_thermal: Fix NULL pointer deref on module load / probe (bsc#1051510).
- thermal: power_allocator: fix one race condition issue for thermal_instances list (bsc#1051510).
- thunderbolt: Prevent crash when ICM firmware is not running (bsc#1090888).
- thunderbolt: Resume control channel after hibernation image is created (bsc#1051510).
- thunderbolt: Serialize PCIe tunnel creation with PCI rescan (bsc#1090888).
- thunderbolt: Wait a bit longer for ICM to authenticate the active NVM (bsc#1090888).
- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#1099918).
- timers: Invoke timer_start_debug() where it makes sense (Git-fixes).
- timers: Reinitialize per cpu bases on hotplug (Git-fixes).
- timers: Unconditionally check deferrable base (Git-fixes).
- timers: Use deferrable base independent of base::nohz_active (Git-fixes).
- tipc: add policy for TIPC_NLA_NET_ADDR (networking-stable-18_04_26).
- tipc: fix a memory leak in tipc_nl_node_get_link() (networking-stable-18_01_28).
- tipc: fix hanging poll() for stream sockets (networking-stable-17_12_31).
- tipc: fix memory leak in tipc_accept_from_sock() (networking-stable-17_12_12).
- tools headers: Restore READ_ONCE() C++ compatibility (bsc#1093023).
- tools/lib/subcmd/pager.c: do not alias select() params (Fix gcc 8 restrict error).
- tracing/uprobe_event: Fix strncpy corner case (bsc#1099918).
- tracing: Fix converting enum's from the map in trace_event_eval_update() (bsc#1099918).
- tracing: Fix missing tab for hwlat_detector print format (bsc#1099918).
- tracing: Kconfig text fixes for CONFIG_HWLAT_TRACER (bsc#1099918).
- tracing: Make the snapshot trigger work with instances (bsc#1099918).
- tracing: probeevent: Fix to support minus offset from symbol (bsc#1099918).
- tty fix oops when rmmod 8250 (bsc#1051510).
- tty/serial: atmel: add new version check for usart (bsc#1051510).
- tty/serial: atmel: use port->name as name in request_irq() (bsc#1051510).
- tty: Avoid possible error pointer dereference at tty_ldisc_restore() (bsc#1051510).
- tty: Do not call panic() at tty_ldisc_init() (bsc#1051510).
- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bsc#1051510).
- tty: fix __tty_insert_flip_char regression (bsc#1051510).
- tty: fix tty_ldisc_receive_buf() documentation (bsc#1051510).
- tty: improve tty_insert_flip_char() fast path (bsc#1051510).
- tty: improve tty_insert_flip_char() slow path (bsc#1051510).
- tty: make n_tty_read() always abort if hangup is in progress (bsc#1051510).
- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bsc#1051510).
- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bsc#1051510).
- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bsc#1051510).
- tty: pl011: Avoid spuriously stuck-off interrupts (bsc#1051510).
- tty: vt: fix up tabstops properly (bsc#1051510).
- tun/tap: sanitize TUNSETSNDBUF input (networking-stable-17_11_14).
- tun: allow positive return values on dev_get_valid_name() call (networking-stable-17_11_14).
- tun: bail out from tun_get_user() if the skb is empty (networking-stable-17_10_09).
- tun: call dev_get_valid_name() before register_netdevice() (networking-stable-17_11_14).
- ubi: Fix error for write access (bsc#1051510).
- ubi: Fix race condition between ubi volume creation and udev (bsc#1051510).
- ubi: Reject MLC NAND (bsc#1051510).
- ubi: block: Fix locking for idr_alloc/idr_remove (bsc#1051510).
- ubi: fastmap: Cancel work upon detach (bsc#1051510).
- ubi: fastmap: Cancel work upon detach (bsc#1051510).
- ubi: fastmap: Do not flush fastmap work on detach (bsc#1051510).
- ubi: fastmap: Erase outdated anchor PEBs during attach (bsc#1051510).
- ubifs: Check ubifs_wbuf_sync() return code (bsc#1052766).
- ubifs: free the encrypted symlink target (bsc#1052766).
- udf: Avoid overflow when session starts at large offset (bsc#1052766).
- udf: Fix leak of UTF-16 surrogates into encoded strings (bsc#1052766).
- usb: core: Add quirk for HP v222w 16GB Mini (bsc#1090888).
- usb: quirks: add control message delay for 1b1c:1b20 (bsc#1087092).
- usb: typec: ucsi: Fix for incorrect status data issue (bsc#1100132).
- usb: typec: ucsi: Increase command completion timeout value (bsc#1090888).
- usb: typec: ucsi: acpi: Workaround for cache mode issue (bsc#1100132).
- usb: xhci: Disable slot even when virt-dev is null (bsc#1085539).
- usb: xhci: Fix potential memory leak in xhci_disable_slot() (bsc#1085539).
- usb: xhci: Make some static functions global ().
- usbip: usbip_host: delete device from busid_table after rebind (bsc#1096480).
- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).
- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).
- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bsc#1096480).
- usbip: usbip_host: run rebind from exit when module is removed (bsc#1096480).
- usbip: vudc: fix null pointer dereference on udc->lock (bsc#1087092).
- userns: Do not fail follow_automount based on s_user_ns (bsc#1099918).
- vfb: fix video mode and line_length being set when loaded (bsc#1100362).
- vfio: Use get_user_pages_longterm correctly (bsc#1095337).
- vfio: disable filesystem-dax page pinning (bsc#1095337).
- vfio: platform: Fix reset module leak in error path (bsc#1099918).
- vhost: Fix vhost_copy_to_user() (networking-stable-18_04_13).
- vhost: correctly remove wait queue during poll failure (networking-stable-18_04_10).
- vhost: fix vhost_vq_access_ok() log check (networking-stable-18_04_13).
- vhost: validate log when IOTLB is enabled (networking-stable-18_04_10).
- vhost_net: add missing lock nesting notation (networking-stable-18_04_10).
- vhost_net: stop device during reset owner (networking-stable-18_02_06).
- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).
- video/hdmi: Allow 'empty' HDMI infoframes (bsc#1051510).
- video: fbdev/mmp: add MODULE_LICENSE (bsc#1051510).
- video: fbdev: atmel_lcdfb: fix display-timings lookup (bsc#1051510).
- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bsc#1051510).
- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bsc#1051510).
- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bsc#1051510).
- virtio-gpu: fix ioctl and expose the fixed status to userspace (bsc#1100382).
- virtio: add ability to iterate over vqs (bsc#1051510).
- virtio: release virtio index when fail to device_register (bsc#1051510).
- virtio_console: do not tie bufs to a vq (bsc#1051510).
- virtio_console: drop custom control queue cleanup (bsc#1051510).
- virtio_console: free buffers after reset (bsc#1051510).
- virtio_console: move removal code (bsc#1051510).
- virtio_console: reset on out of memory (bsc#1051510).
- virtio_net: fix adding vids on big-endian (networking-stable-18_04_26).
- virtio_net: split out ctrl buffer (networking-stable-18_04_26).
- virtio_ring: fix num_free handling in error case (bsc#1051510).
- vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi (networking-stable-18_04_26).
- vlan: also check phy_driver ts_info for vlan's real device (networking-stable-18_04_10).
- vlan: fix a use-after-free in vlan_device_event() (networking-stable-17_11_20).
- vmw_balloon: fix inflation with batching (bsc#1051510).
- vmw_balloon: fixing double free when batching mode is off (bsc#1051510).
- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860).
- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860).
- vmxnet3: increase default rx ring sizes (bsc#1091860).
- vmxnet3: repair memory leak (bsc#1051510).
- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860).
- vmxnet3: use DMA memory barriers where required (bsc#1091860).
- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860).
- vrf: Fix use after free and double free in vrf_finish_output (networking-stable-18_04_10).
- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bsc#1051510).
- vt: change SGR 21 to follow the standards (bsc#1051510).
- vt: prevent leaking uninitialized data to userspace via /dev/vcs* (bsc#1051510).
- vti6: Change minimum MTU to IPV4_MIN_MTU, vti6 can carry IPv4 too (bsc#1082869).
- vti6: Fix dev->max_mtu setting (bsc#1082869).
- vti6: Keep set MTU on link creation or change, validate it (bsc#1082869).
- vti6: Properly adjust vti6 MTU from MTU of lower device (bsc#1082869).
- vti6: better validate user provided tunnel names (networking-stable-18_04_10).
- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bsc#1076830).
- vxlan: fix the issue that neigh proxy blocks all icmpv6 packets (networking-stable-17_11_20).
- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bsc#1051510).
- wait: add wait_event_killable_timeout() (bsc#1099792).
- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).
- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).
- watchdog: da9063: Fix updating timeout value (bsc#1100843).
- watchdog: f71808e_wdt: Fix WD_EN register read (bsc#1051510).
- watchdog: f71808e_wdt: Fix magic close handling (bsc#1051510).
- watchdog: sp5100_tco: Fix watchdog disable bit (bsc#1051510).
- wcn36xx: Fix dynamic power saving (bsc#1051510).
- wcn36xx: Introduce mutual exclusion of fw configuration (bsc#1051510).
- wl1251: check return from call to wl1251_acx_arp_ip_filter (bsc#1051510).
- workqueue: Allow retrieval of current task's work struct (bsc#1051510).
- workqueue: use put_device() instead of kfree() (bsc#1051510).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158).
- x86/cpu_entry_area: Map also trace_idt_table (bsc#1089878).
- x86/intel_rdt: Add command line parameter to control L2_CDP ().
- x86/intel_rdt: Add two new resources for L2 Code and Data Prioritization (CDP) ().
- x86/intel_rdt: Enable L2 CDP in MSR IA32_L2_QOS_CFG ().
- x86/intel_rdt: Enumerate L2 Code and Data Prioritization (CDP) feature ().
- x86/mm: add a function to check if a pfn is UC/UC-/WC (bsc#1087213).
- x86/pkeys: Add arch_pkeys_enabled() (bsc#1078248).
- x86/pkeys: Move vma_pkey() into asm/pkeys.h (bsc#1078248).
- x86/pti: do not report XenPV as vulnerable (bsc#1097551).
- x86/setup: Do not reserve a crash kernel region if booted on Xen PV (bsc#1085626).
- x86/stacktrace: Clarify the reliable success paths (bnc#1058115).
- x86/stacktrace: Do not fail for ORC with regs on stack (bnc#1058115).
- x86/stacktrace: Do not unwind after user regs (bnc#1058115).
- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder (bnc#1058115).
- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115).
- x86/tsc: Future-proof native_calibrate_tsc() (bsc#1074873).
- x86/unwind/orc: Detect the end of the stack (bnc#1058115).
- xen/acpi: off by one in read_acpi_id() (bnc#1065600).
- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).
- xen: do not print error message in case of missing Xenstore entry (bnc#1065600).
- xhci: Add port status decoder for tracing purposes ().
- xhci: Fix USB ports for Dell Inspiron 5775 (bsc#1090888).
- xhci: add definitions for all port link states ().
- xhci: add port speed ID to portsc tracing ().
- xhci: add port status tracing ().
- xhci: fix endpoint context tracer output (bsc#1087092).
- xhci: workaround for AMD Promontory disabled ports wakeup (bsc#1087092).
- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bsc#1090888).
- xprtrdma: Fix list corruption / DMAR errors during MR recovery (git-fixes).
- xprtrdma: Return -ENOBUFS when no pages are available (git-fixes).
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-1420,SUSE-SLE-Module-Development-Tools-15-2018-1420,SUSE-SLE-Module-Legacy-15-2018-1420,SUSE-SLE-Module-Live-Patching-15-2018-1420,SUSE-SLE-Product-HA-15-2018-1420,SUSE-SLE-Product-WE-15-2018-1420
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following new feature was added:\n\n- NVDIMM memory error notification (ACPI 6.2)\n\nThe following security bugs were fixed:\n\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could\n have result in local attackers being able to crash the kernel or potentially\n elevate privileges because kmalloc_array is not used (bnc#1100418)\n- CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a\n large relative timeout because ktime_add_safe was not used (bnc#1099924)\n- CVE-2018-9385: Prevent overread of the \u0027driver_override\u0027 buffer (bsc#1100491)\n- CVE-2018-13405: The inode_init_owner function allowed local users to create\n files with an unintended group ownership allowing attackers to escalate\n privileges by making a plain file executable and SGID (bnc#1100416)\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution\n and branch prediction may have allowed unauthorized disclosure of information\n to an attacker with local user access via a side-channel analysis (bsc#1068032)\n- CVE-2018-1118: Linux kernel vhost did not properly initialize memory in\n messages passed between virtual guests and the host operating system. This\n could have allowed local privileged users to read some kernel memory contents\n when reading from the /dev/vhost-net device file (bsc#1092472)\n- CVE-2018-12233: A memory corruption bug in JFS could have been triggered by\n calling setxattr twice with two different extended attribute names on the same\n file. This vulnerability could be triggered by an unprivileged user with the\n ability to create files and execute programs (bsc#1097234)\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO\n ioctl (bsc#1096728)\n- CVE-2018-3639: Systems with microprocessors utilizing speculative execution\n and speculative execution of memory reads the addresses of all prior memory\n writes are known may have allowed unauthorized disclosure of information to an\n attacker with local user access via a side-channel analysis, aka Speculative\n Store Bypass (SSB), Variant 4 (bsc#1087082)\n- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process\u0027s memory\n containing command line arguments (or environment strings), an attacker could\n have caused utilities from psutils or procps (such as ps, w) to block\n indefinitely (denial of service) or for some controlled time (as a\n synchronization primitive for other attacks) (bsc#1093158)\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007)\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012)\n- 1093: The ext4_valid_block_bitmap function allowed attackers to cause a\n denial of service (out-of-bounds read and system crash) via a crafted ext4\n image because balloc.c and ialloc.c do not validate bitmap block numbers\n (bsc#1087095)\n- CVE-2018-1000200: Prevent NULL pointer dereference which could have resulted\n in an out of memory (OOM) killing of large mlocked processes (bsc#1090150)\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904)\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900)\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962)\n- CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability\n allowing local users with access to the udldrmfb driver to obtain full read and\n write permissions on kernel physical pages, resulting in a code execution in\n kernel space (bsc#1090643)\n- CVE-2018-10124: The kill_something_info function in kernel/signal.c might\n have allowed local users to cause a denial of service via an INT_MIN argument\n (bnc#1089752)\n- CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed\n local users to cause a denial of service by triggering an attempted use of the\n-INT_MIN value (bnc#1089608)\n- CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker\n with local user access caused by speculative execution and indirect branch\n prediction (bsc#1068032)\n\nThe following non-security bugs were fixed:\n\n- Fix copy_in_user() declaration (bsc#1052766).\n- 1wire: family module autoload fails because of upper/lower case mismatch (bsc#1051510).\n- 8021q: fix a memory leak for VLAN 0 device (networking-stable-18_01_12).\n- 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (networking-stable-18_05_15).\n- 8139too: revisit napi_complete_done() usage (networking-stable-17_10_09).\n- 9p/trans_virtio: discard zero-length reply (bsc#1052766).\n- ACPI / APEI: Replace ioremap_page_range() with fixmap (bsc#1051510).\n- ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bsc#1051510).\n- ACPI / NUMA: ia64: Parse all entries of SRAT memory affinity table (bnc#1088796).\n- ACPI / bus: Do not call _STA on battery devices with unmet dependencies (bsc#1051510).\n- ACPI / button: make module loadable when booted in non-ACPI mode (bsc#1051510).\n- ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bsc#1051510).\n- ACPI / scan: Initialize watchdog before PNP (bsc#1073960).\n- ACPI / scan: Send change uevent with offine environmental data (bsc#1082485).\n- ACPI / scan: Use acpi_bus_get_status() to initialize ACPI_TYPE_DEVICE devs (bsc#1051510).\n- ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bsc#1051510).\n- ACPI / video: Default lcd_only to true on Win8-ready and newer machines (bsc#1051510).\n- ACPI / video: Only default only_lcd to true on Win8-ready _desktops_ (bsc#1051510).\n- ACPI / watchdog: Prefer iTCO_wdt on Lenovo Z50-70 (bsc#1051510).\n- ACPI / watchdog: properly initialize resources (bsc#1051510).\n- ACPI: EC: Fix debugfs_create_*() usage (bsc#1051510).\n- ACPI: acpi_pad: Fix memory leak in power saving threads (bsc#1051510).\n- ACPI: processor_perflib: Do not send _PPC change notification if not ready (bsc#1051510).\n- ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEs (bsc#1051510).\n- ACPICA: ACPI 6.0A: Changes to the NFIT ACPI table (bsc#1091424).\n- ACPICA: Events: add a return on failure from acpi_hw_register_read (bsc#1051510).\n- ACPICA: Fix memory leak on unusual memory leak (bsc#1051510).\n- ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bsc#1051510).\n- ALSA: aloop: Add missing cable lock to ctl API callbacks (bsc#1051510).\n- ALSA: aloop: Mark paused device as inactive (bsc#1051510).\n- ALSA: asihpi: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: caiaq: Add yet more sanity checks for invalid EPs (bsc#1051510).\n- ALSA: control: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: control: fix a redundant-copy issue (bsc#1051510).\n- ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bsc#1051510).\n- ALSA: dice: fix OUI for TC group (bsc#1051510).\n- ALSA: dice: fix error path to destroy initialized stream data (bsc#1051510).\n- ALSA: dice: fix kernel NULL pointer dereference due to invalid calculation for array index (bsc#1051510).\n- ALSA: emu10k1: Fix kABI breakage (bsc#1093027).\n- ALSA: emu10k1: add a IOMMU workaround (bsc#1093027).\n- ALSA: emu10k1: add optional debug printouts with DMA addresses (bsc#1093027).\n- ALSA: emu10k1: make sure synth DMA pages are allocated with DMA functions (bsc#1093027).\n- ALSA: emu10k1: remove reserved_page (bsc#1093027).\n- ALSA: emu10k1: use dma_set_mask_and_coherent() (bsc#1093027).\n- ALSA: hda - Fix incorrect usage of IS_REACHABLE() (bsc#1051510).\n- ALSA: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bsc#1051510).\n- ALSA: hda - New VIA controller suppor no-snoop path (bsc#1051510).\n- ALSA: hda - Skip jack and others for non-existing PCM streams (bsc#1051510).\n- ALSA: hda/ca0132 - use ARRAY_SIZE (bsc#1051510).\n- ALSA: hda/ca0132: Add DSP Volume set and New mixers for SBZ + R3Di (bsc#1096696).\n- ALSA: hda/ca0132: Add PCI region2 iomap for SBZ (bsc#1096696).\n- ALSA: hda/ca0132: Add dsp setup + gpio functions for r3di (bsc#1096696).\n- ALSA: hda/ca0132: Add extra exit functions for R3Di and SBZ (bsc#1096696).\n- ALSA: hda/ca0132: Add new control changes for SBZ + R3Di (bsc#1096696).\n- ALSA: hda/ca0132: Add pincfg for SBZ + R3Di, add fp hp auto-detect (bsc#1096696).\n- ALSA: hda/ca0132: Delete pointless assignments to struct auto_pin_cfg fields (bsc#1051510).\n- ALSA: hda/ca0132: Delete redundant UNSOL event requests (bsc#1051510).\n- ALSA: hda/ca0132: Do not test for QUIRK_NONE (bsc#1051510).\n- ALSA: hda/ca0132: Fix DMic data rate for Alienware M17x R4 (bsc#1051510).\n- ALSA: hda/ca0132: R3Di and SBZ quirk entires + alt firmware loading (bsc#1096696).\n- ALSA: hda/ca0132: Restore PCM Analog Mic-In2 (bsc#1051510).\n- ALSA: hda/ca0132: Restore behavior of QUIRK_ALIENWARE (bsc#1051510).\n- ALSA: hda/ca0132: add alt_select_in/out for R3Di + SBZ (bsc#1096696).\n- ALSA: hda/ca0132: add ca0132_alt_set_vipsource (bsc#1096696).\n- ALSA: hda/ca0132: add dsp setup related commands for the sbz (bsc#1096696).\n- ALSA: hda/ca0132: add extra init functions for r3di + sbz (bsc#1096696).\n- ALSA: hda/ca0132: add the ability to set src_id on scp commands (bsc#1096696).\n- ALSA: hda/ca0132: constify parameter table for effects (bsc#1096696).\n- ALSA: hda/ca0132: constify read-only members of string array (bsc#1096696).\n- ALSA: hda/ca0132: constify templates for control element set (bsc#1096696).\n- ALSA: hda/ca0132: fix array_size.cocci warnings (bsc#1096696).\n- ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1051510).\n- ALSA: hda/ca0132: make array ca0132_alt_chmaps static (bsc#1051510).\n- ALSA: hda/ca0132: merge strings just for printk (bsc#1096696).\n- ALSA: hda/ca0132: update core functions for sbz + r3di (bsc#1096696).\n- ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975).\n- ALSA: hda/conexant - Add hp-mic-fix model string (bsc#1092975).\n- ALSA: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1051510).\n- ALSA: hda/realtek - Add shutup hint (bsc#1051510).\n- ALSA: hda/realtek - Add some fixes for ALC233 (bsc#1051510).\n- ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup (bsc#1051510).\n- ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs (bsc#1051510).\n- ALSA: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of two front mics on more machines (bsc#1051510).\n- ALSA: hda/realtek - Fixup for HP x360 laptops with BandO speakers (bsc#1096705).\n- ALSA: hda/realtek - Fixup mute led on HP Spectre x360 (bsc#1096705).\n- ALSA: hda/realtek - Refactor alc269_fixup_hp_mute_led_mic*() (bsc#1096705).\n- ALSA: hda/realtek - Update ALC255 depop optimize (bsc#1051510).\n- ALSA: hda/realtek - adjust the location of one mic (bsc#1051510).\n- ALSA: hda/realtek - change the location for one of two front mics (bsc#1051510).\n- ALSA: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1051510).\n- ALSA: hda: Add ASRock H81M-HDS to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Clevo W35xSS_370SS to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Gigabyte P55A-UD3 and Z87-D3HP to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Icelake PCI ID (bsc#1051510).\n- ALSA: hda: Add Intel NUC5i7RY to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Intel NUC7i3BNB to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bsc#1051510).\n- ALSA: hda: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: hda: add dock and led support for HP EliteBook 830 G5 (bsc#1051510).\n- ALSA: hda: add dock and led support for HP ProBook 640 G4 (bsc#1051510).\n- ALSA: hdspm: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: hiface: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: line6: Add yet more sanity checks for invalid EPs (bsc#1051510).\n- ALSA: line6: Use correct endpoint type for midi output (bsc#1051510).\n- ALSA: line6: add support for POD HD DESKTOP (bsc#1051510).\n- ALSA: line6: add support for POD HD500X (bsc#1051510).\n- ALSA: line6: remove unnecessary initialization to PODHD500X (bsc#1051510).\n- ALSA: opl3: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bsc#1051510).\n- ALSA: pcm: Check PCM state at xfern compat ioctl (bsc#1051510).\n- ALSA: pcm: Fix UAF at PCM release via PCM timer access (bsc#1051510).\n- ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bsc#1051510).\n- ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bsc#1051510).\n- ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bsc#1051510).\n- ALSA: pcm: potential uninitialized return values (bsc#1051510).\n- ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bsc#1051510).\n- ALSA: rme9652: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: seq: Fix UBSAN warning at SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT ioctl (bsc#1051510).\n- ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bsc#1051510).\n- ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bsc#1051510).\n- ALSA: seq: oss: Hardening for potential Spectre v1 (bsc#1051510).\n- ALSA: timer: Fix UBSAN warning at SNDRV_TIMER_IOCTL_NEXT_DEVICE ioctl (bsc#1051510).\n- ALSA: timer: Fix pause event notification (bsc#1051510).\n- ALSA: usb-audio: Add \u0027Keep Interface\u0027 control (bsc#1089467).\n- ALSA: usb-audio: Add a quirk for Nura\u0027s first gen headset (bsc#1051510).\n- ALSA: usb-audio: Add keep_iface flag (bsc#1089467).\n- ALSA: usb-audio: Add native DSD support for Luxman DA-06 (bsc#1051510).\n- ALSA: usb-audio: Add native DSD support for Mytek DACs (bsc#1051510).\n- ALSA: usb-audio: Add native DSD support for TEAC UD-301 (bsc#1051510).\n- ALSA: usb-audio: Add sample rate quirk for Plantronics C310/C520-M (bsc#1051510).\n- ALSA: usb-audio: Add sample rate quirk for Plantronics P610 (bsc#1051510).\n- ALSA: usb-audio: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: usb-audio: Allow to override the longname string (bsc#1091678).\n- ALSA: usb-audio: Apply vendor ID matching for sample rate quirk (bsc#1051510).\n- ALSA: usb-audio: Avoid superfluous usb_set_interface() calls (bsc#1089467).\n- ALSA: usb-audio: Change the semantics of the enable option (bsc#1051510).\n- ALSA: usb-audio: Disable the quirk for Nura headset (bsc#1051510).\n- ALSA: usb-audio: FIX native DSD support for TEAC UD-501 DAC (bsc#1051510).\n- ALSA: usb-audio: Generic DSD detection for XMOS-based implementations (bsc#1051510).\n- ALSA: usb-audio: Give proper vendor/product name for Dell WD15 Dock (bsc#1091678).\n- ALSA: usb-audio: Initialize Dell Dock playback volumes (bsc#1089467).\n- ALSA: usb-audio: Integrate native DSD support for ITF-USB based DACs (bsc#1051510).\n- ALSA: usb-audio: Remove explicitly listed Mytek devices (bsc#1051510).\n- ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658).\n- ALSA: usb-audio: Support changing input on Sound Blaster E1 (bsc#1051510).\n- ALSA: usb-audio: add boot quirk for Axe-Fx III (bsc#1051510).\n- ALSA: usb-audio: add more quirks for DSD interfaces (bsc#1051510).\n- ALSA: usb-audio: simplify set_sync_ep_implicit_fb_quirk (bsc#1051510).\n- ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bsc#1051510).\n- ALSA: usx2y: Add sanity checks for invalid EPs (bsc#1051510).\n- ALSA: usx2y: Fix invalid stream URBs (bsc#1051510).\n- ALSA: vmaster: Propagate slave error (bsc#1051510).\n- ASoC: Intel: Skylake: Disable clock gating during firmware and library download (bsc#1051510).\n- ASoC: Intel: cht_bsw_rt5645: Analog Mic support (bsc#1051510).\n- ASoC: Intel: sst: remove redundant variable dma_dev_name (bsc#1051510).\n- ASoC: adau17x1: Handling of DSP_RUN register during fw setup (bsc#1051510).\n- ASoC: cirrus: i2s: Fix LRCLK configuration (bsc#1051510).\n- ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bsc#1051510).\n- ASoC: cs35l35: Add use_single_rw to regmap config (bsc#1051510).\n- ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bsc#1051510).\n- ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bsc#1051510).\n- ASoC: hdmi-codec: Fix module unloading caused kernel crash (bsc#1051510).\n- ASoC: hdmi-codec: fix spelling mistake: \u0027deteced\u0027 -\u003e \u0027detected\u0027 (bsc#1051510).\n- ASoC: hdmi-codec: remove multi detection support (bsc#1051510).\n- ASoC: omap: Remove OMAP_MUX dependency from Nokia N810 audio support (bsc#1051510).\n- ASoC: rockchip: Fix dai_name for HDMI codec (bsc#1051510).\n- ASoC: rockchip: rk3288-hdmi-analog: Select needed codecs (bsc#1051510).\n- ASoC: rsnd: mark PM functions __maybe_unused (bsc#1051510).\n- ASoC: rt5514: Add the missing register in the readable table (bsc#1051510).\n- ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bsc#1051510).\n- ASoC: samsung: odroid: Drop requirement of clocks in the sound node (bsc#1051510).\n- ASoC: samsung: odroid: Fix 32000 sample rate handling (bsc#1051510).\n- ASoC: samsung: odroid: Fix EPLL frequency values (bsc#1051510).\n- ASoC: ssm2602: Replace reg_default_raw with reg_default (bsc#1051510).\n- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).\n- ASoC: topology: Check widget kcontrols before deref (bsc#1051510).\n- ASoC: topology: Fix bugs of freeing soc topology (bsc#1051510).\n- ASoC: topology: Fix kcontrol name string handling (bsc#1051510).\n- ASoC: topology: create TLV data for dapm widgets (bsc#1051510).\n- ASoC: topology: fix some tiny memory leaks (bsc#1051510).\n- Bluetooth: Add a new 04ca:3015 QCA_ROME device (bsc#1051510).\n- Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504).\n- Bluetooth: Fix missing encryption refresh on Security Request (bsc#1051510).\n- Bluetooth: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for BTUSB_QCA_ROME (bsc#1051510).\n- Bluetooth: btrtl: Fix a error code in rtl_load_config() (bsc#1051510).\n- Bluetooth: btusb: Add Dell XPS 13 9360 to btusb_needs_reset_resume_table (bsc#1051510).\n- Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bsc#1051510).\n- Bluetooth: btusb: Add device ID for RTL8822BE (bsc#1051510).\n- Bluetooth: btusb: Only check needs_reset_resume DMI table for QCA rome chipsets (bsc#1051510).\n- Bluetooth: btusb: add ID for LiteOn 04ca:3016 (bsc#1051510).\n- Bluetooth: hci_bcm: Add 6 new ACPI HIDs (bsc#1051510).\n- Bluetooth: hci_bcm: Add active_low irq polarity quirk for Asus T100CHI (bsc#1051510).\n- Bluetooth: hci_bcm: Add support for BCM2E72 (bsc#1051510).\n- Bluetooth: hci_bcm: Add support for MINIX Z83-4 based devices (bsc#1051510).\n- Bluetooth: hci_bcm: Fix setting of irq trigger type (bsc#1051510).\n- Bluetooth: hci_bcm: Handle empty packet after firmware loading (bsc#1051510).\n- Bluetooth: hci_bcm: Make bcm_request_irq fail if no IRQ resource (bsc#1051510).\n- Bluetooth: hci_bcm: Remove DMI quirk for the MINIX Z83-4 (bsc#1051510).\n- Bluetooth: hci_bcm: Treat Interrupt ACPI resources as always being active-low (bsc#1051510).\n- Bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bsc#1051510).\n- Btrfs: fix copy_items() return value when logging an inode (bsc#1097105).\n- Btrfs: fix xattr loss after power failure (bsc#1097105).\n- Btrfs: use btrfs_op instead of bio_op in __btrfs_map_block (bsc#1099918).\n- Correct bug reference in the patch (bnc#1095155)\n- Delete patches.arch/powerpc64-ftrace-Use-the-generic-version-of-ftrace_r.patch (bsc#1088804).\n- Downgrade printk level for MMC SDHCI host version error (bsc#1097941).\n- Fix kABI breakage due to acpi_ec gpe field change (bsc#1051510).\n- Fix kABI breakage due to snd_usb_audio_quirk profile_name addition (bsc#1091678).\n- Fix kABI breakage due to sound/timer.h inclusion (bsc#1051510).\n- Fix kABI breakage for iwl_fw_runtime_ops change (bsc#1051510).\n- Fix kABI breakage for iwlwifi (bsc#1051510).\n- Fix kABI breakage of iio_buffer (bsc#1051510).\n- Fix kABI incompatibility by snd_pcm_oss_runtime.rw_ref addition (bsc#1051510).\n- Fix the build error in adau17x1 soc driver (bsc#1051510)\n- Fix the build of da9063_wdt module (bsc#1100843) Backport the missing prerequisite commit, move the previous fixes into the sorted section and refresh.\n- GFS2: Take inode off order_write list when setting jdata flag (bsc#1052766).\n- HID: add backlight level quirk for Asus ROG laptops (bsc#1101324).\n- HID: cp2112: fix broken gpio_direction_input callback (bsc#1051510).\n- HID: debug: check length before copy_to_user() (bsc#1051510).\n- HID: hiddev: fix potential Spectre v1 (bsc#1051510).\n- HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bsc#1051510).\n- HID: i2c-hid: Fix \u0027incomplete report\u0027 noise (bsc#1051510).\n- HID: i2c-hid: fix size check and type usage (bsc#1051510).\n- HID: intel-ish-hid: Enable Gemini Lake ish driver (bsc#1073765,).\n- HID: intel-ish-hid: use put_device() instead of kfree() (bsc#1051510).\n- HID: intel_ish-hid: ipc: register more pm callbacks to support hibernation (bsc#1051510).\n- HID: lenovo: Add support for IBM/Lenovo Scrollpoint mice (bsc#1051510).\n- HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1051510).\n- HID: wacom: Add support for One by Wacom (CTL-472 / CTL-672) (bsc#1100633).\n- HID: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro large (bsc#1051510).\n- HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bsc#1051510).\n- HID: wacom: EKR: ensure devres groups at higher indexes are released (bsc#1051510).\n- HID: wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events (bsc#1051510).\n- HID: wacom: Release device resource data obtained by devres_alloc() (bsc#1051510).\n- HID: wacom: bluetooth: send exit report for recent Bluetooth devices (bsc#1051510).\n- IB/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793).\n- IB/core: Generate GID change event regardless of RoCE GID table property (bsc#1046306).\n- IB/core: Refer to RoCE port property instead of GID table property (bsc#1046306).\n- IB/cq: Do not force IB_POLL_DIRECT poll context for ib_process_cq_direct (bsc#1046306).\n- IB/hfi1 Use correct type for num_user_context (bsc#1096793).\n- IB/hfi1: Add a safe wrapper for _rcd_get_by_index (bsc#1096793).\n- IB/hfi1: Add tx_opcode_stats like the opcode_stats (bsc#1096793).\n- IB/hfi1: Complete check for locally terminated smp (bsc#1096793).\n- IB/hfi1: Compute BTH only for RDMA_WRITE_LAST/SEND_LAST packet (bsc#1096793).\n- IB/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793).\n- IB/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793).\n- IB/hfi1: Do not allocate PIO send contexts for VNIC (bsc#1096793).\n- IB/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793).\n- IB/hfi1: Do not override given pcie_pset value (bsc#1096793).\n- IB/hfi1: Ensure VL index is within bounds (bsc#1096793).\n- IB/hfi1: Fix NULL pointer dereference when invalid num_vls is used (bsc#1060463).\n- IB/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793).\n- IB/hfi1: Fix for early release of sdma context (bsc#1096793).\n- IB/hfi1: Fix handling of FECN marked multicast packet (bsc#1060463).\n- IB/hfi1: Fix loss of BECN with AHG (bsc#1096793).\n- IB/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793).\n- IB/hfi1: Fix serdes loopback set-up (bsc#1096793).\n- IB/hfi1: Handle initial value of 0 for CCTI setting (bsc#1096793).\n- IB/hfi1: Inline common calculation (bsc#1096793).\n- IB/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793).\n- IB/hfi1: Look up ibport using a pointer in receive path (bsc#1096793).\n- IB/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793).\n- IB/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793).\n- IB/hfi1: Prevent LNI hang when LCB can\u0027t obtain lanes (bsc#1096793).\n- IB/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793).\n- IB/hfi1: Race condition between user notification and driver state (bsc#1096793).\n- IB/hfi1: Re-order IRQ cleanup to address driver cleanup race (bsc#1060463).\n- IB/hfi1: Refactor assign_ctxt() IOCTL (bsc#1096793).\n- IB/hfi1: Refactor get_base_info (bsc#1096793).\n- IB/hfi1: Refactor get_ctxt_info (bsc#1096793).\n- IB/hfi1: Refactor get_user() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_clear() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_invalid() IOCTLs (bsc#1096793).\n- IB/hfi1: Refactor hfi_user_exp_rcv_setup() IOCTL (bsc#1096793).\n- IB/hfi1: Remove unused hfi1_cpulist variables (bsc#1096793).\n- IB/hfi1: Reorder incorrect send context disable (bsc#1096793).\n- IB/hfi1: Return correct value for device state (bsc#1096793).\n- IB/hfi1: Send \u0027reboot\u0027 as planned down remote reason (bsc#1096793).\n- IB/hfi1: Set port number for errorinfo MAD response (bsc#1096793).\n- IB/hfi1: Show fault stats in both TX and RX directions (bsc#1096793).\n- IB/hfi1: Update HFI to use the latest PCI API (bsc#1096793).\n- IB/hfi1: Use after free race condition in send context error path (bsc#1096793).\n- IB/hfi1: Validate PKEY for incoming GSI MAD packets (bsc#1096793).\n- IB/ipoib: Avoid memory leak if the SA returns a different DGID (bsc#1046307).\n- IB/ipoib: Change number of TX wqe to 64 (bsc#1096793).\n- IB/ipoib: Fix for notify send CQ failure messages (bsc#1096793).\n- IB/ipoib: Fix for potential no-carrier state (bsc#1046307).\n- IB/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793).\n- IB/ipoib: Use NAPI in UD/TX flows (bsc#1096793).\n- IB/mlx4: Fix integer overflow when calculating optimal MTT size (bsc#1071218).\n- IB/mlx4: Move mlx4_uverbs_ex_query_device_resp to include/uapi/ (bsc#1071218).\n- IB/mlx5: Enable ECN capable bits for UD RoCE v2 QPs (bsc#1046305).\n- IB/mlx5: Respect new UMR capabilities (bsc#1093205).\n- IB/mlx5: Set the default active rate and width to QDR and 4X (bsc#1046305).\n- IB/mlx5: Use unlimited rate when static rate is not supported (bsc#1046305).\n- IB/mlx5:: pr_err() and mlx5_ib_dbg() strings should end with newlines (bsc#1093205).\n- IB/rdmavt: Add trace for RNRNAK timer (bsc#1096793).\n- IB/rdmavt: Allocate CQ memory on the correct node (bsc#1058717).\n- IB/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793).\n- IB/rdmavt: Use correct numa node for SRQ allocation (bsc#1096793).\n- IB/srp: Fix completion vector assignment algorithm (bsc#1046306).\n- IB/srp: Fix srp_abort() (bsc#1046306).\n- IB/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bsc#1046306).\n- IB/uverbs: Fix validating mandatory attributes (bsc#1046306).\n- IB/{hfi1, qib}: Add handling of kernel restart (bsc#1096793).\n- IB/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793).\n- IB/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793).\n- Input: ALPS - fix TrackStick detection on Thinkpad L570 and Latitude 7370 (bsc#1051510).\n- Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bsc#1051510).\n- Input: atmel_mxt_ts - fix the firmware update (bsc#1051510).\n- Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bsc#1051510).\n- Input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bsc#1051510).\n- Input: elan_i2c_smbus - fix corrupted stack (bsc#1051510).\n- Input: elan_i2c_smbus - fix more potential stack buffer overflows (bsc#1051510).\n- Input: elantech - enable middle button of touchpads on ThinkPad P52 (bsc#1051510).\n- Input: elantech - fix V4 report decoding for module with middle key (bsc#1051510).\n- Input: goodix - add new ACPI id for GPD Win 2 touch screen (bsc#1051510).\n- Input: goodix - disable IRQs while suspended (bsc#1051510).\n- Input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bsc#1051510).\n- Input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bsc#1051510).\n- Input: leds - fix out of bound access (bsc#1051510).\n- Input: synaptics - Lenovo Carbon X1 Gen5 (2017) devices should use RMI (bsc#1051510).\n- Input: synaptics - Lenovo Thinkpad X1 Carbon G5 (2017) with Elantech trackpoints should use RMI (bsc#1051510).\n- Input: synaptics - add Intertouch support on X1 Carbon 6th and X280 (bsc#1051510).\n- Input: synaptics - add Lenovo 80 series ids to SMBus (bsc#1051510).\n- Input: synaptics - reset the ABS_X/Y fuzz after initializing MT axes (bsc#1051510).\n- Input: synaptics-rmi4 - fix an unchecked out of memory error path (bsc#1051510).\n- Input: synaptics: Add intertouch blacklist for Thinkpad Helix (bsc#1090457).\n- Input: xpad - add GPD Win 2 Controller USB IDs (bsc#1051510).\n- Input: xpad - fix GPD Win 2 controller name (bsc#1051510).\n- Input: xpad - sync supported devices with 360Controller (bsc#1051510).\n- Input: xpad - sync supported devices with XBCD (bsc#1051510).\n- KABI protect struct nd_region ().\n- KABI: hide ftrace_enabled in paca (bsc#1088804).\n- KEYS: DNS: limit the length of option strings (networking-stable-18_04_26).\n- KEYS: Use individual pages in big_key for crypto buffers (bsc#1051510).\n- KVM: MMU: consider host cache mode in MMIO page check (bsc#1087213).\n- KVM: PPC: Book3S HV: Fix ppc_breakpoint_available compile error (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle migration with POWER9 disabled DAWR (bsc#1061840).\n- KVM: PPC: Book3S HV: Return error from h_set_dabr() on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Return error from h_set_mode(SET_DAWR) on POWER9 (bsc#1061840).\n- KVM: PPC: Book3S HV: trace_tlbie must not be called in realmode (bsc#1061840).\n- MD: Free bioset when md_run fails (bsc#1093023).\n- Move upstreamed ideapad-laptop patch to sorted section (bsc#1093035)\n- NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bsc#1090888).\n- NFC: fix device-allocation error return (bsc#1051510).\n- NFC: llcp: Limit size of SDP URI (bsc#1051510).\n- NFC: pn533: do not send USB data off of the stack (bsc#1051510).\n- NFS: Revert \u0027NFS: Move the flock open mode check into nfs_flock()\u0027 (bsc#1098983).\n- NFSv4: Revert commit 5f83d86cf531d (\u0027NFSv4.x: Fix wraparound issues..\u0027) (git-fixes).\n- PCI/ASPM: Add L1 Substates definitions (bsc#1051510).\n- PCI/ASPM: Calculate LTR_L1.2_THRESHOLD from device characteristics (bsc#1051510).\n- PCI/DPC: Do not enable DPC if AER control is not allowed by the BIOS (bsc#1093184).\n- PCI/PME: Handle invalid data when reading Root Status (bsc#1051510).\n- PCI: Add ACS quirk for Intel 300 series (bsc#1051510).\n- PCI: Add ACS quirk for Intel 7th and 8th Gen mobile (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bsc#1051510).\n- PCI: Add function 1 DMA alias quirk for Marvell 9128 (bsc#1051510).\n- PCI: Create SR-IOV virtfn/physfn links before attaching driver (bsc#1051510).\n- PCI: Detach driver before procfs and sysfs teardown on device remove (bsc#1051510).\n- PCI: Mark Broadcom HT1100 and HT2000 Root Port Extended Tags as broken (bsc#1051510).\n- PCI: Remove messages about reassigning resources (bsc#1051510).\n- PCI: Restore config space on runtime resume despite being unbound (bsc#1051510).\n- PCI: aardvark: Fix PCIe Max Read Request Size setting (bsc#1051510).\n- PCI: aardvark: Fix logic in advk_pcie_{rd,wr}_conf() (bsc#1051510).\n- PCI: aardvark: Set PIO_ADDR_LS correctly in advk_pcie_rd_conf() (bsc#1051510).\n- PCI: aardvark: Use ISR1 instead of ISR0 interrupt in legacy irq mode (bsc#1051510).\n- PCI: designware-ep: Fix find_first_zero_bit() usage (bsc#1051510).\n- PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094541).\n- PCI: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bsc#1051510).\n- PCI: shpchp: Enable bridge bus mastering if MSI is enabled (bsc#1051510).\n- PM / OPP: Add missing of_node_put(np) (bsc#1051510).\n- PM / OPP: Call notifier without holding opp_table-\u003elock (bsc#1051510).\n- PM / OPP: Move error message to debug level (bsc#1051510).\n- PM / devfreq: Fix potential NULL pointer dereference in governor_store (bsc#1051510).\n- PM / s2idle: Clear the events_check_enabled flag (bsc#1051510).\n- PM / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1051510).\n- PM: docs: Drop an excess character from devices.rst (bsc#1051510).\n- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n- Preliminary series sort\n- RDMA/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283).\n- RDMA/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283).\n- RDMA/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (bsc#1046306).\n- RDMA/core: Reduce poll batch for direct cq polling (bsc#1046306).\n- RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#1084001).\n- RDMA/mlx4: Fix uABI structure layouts for 32/64 compat (bsc#1071218).\n- RDMA/mlx5: Fix crash while accessing garbage pointer and freed memory (bsc#1046305).\n- RDMA/mlx5: Protect from NULL pointer derefence (bsc#1046305).\n- RDMA/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bsc#1058513).\n- RDMA/rxe: Fix an out-of-bounds read (bsc#1050662).\n- RDMA/ucma: Allow resolving address w/o specifying source address (bsc#1046306).\n- RDMA/ucma: Introduce safer rdma_addr_size() variants (bsc#1046306).\n- RDMAVT: Fix synchronization around percpu_ref (bsc#1058717).\n- RDS: Check cmsg_len before dereferencing CMSG_DATA (networking-stable-17_12_31).\n- README.BRANCH: add Takashi as co-maintainer\n- Re-sort some patches to match SLE15\n- Refresh patches.suse/btrfs-use-kvzalloc-to-allocate-btrfs_fs_info.patch - Fixed References (bsc#1062897). \n- Remove the old fallback for iTCO/WDAT conflict (bsc#1073960) Now the upstream fix is included, so let\u0027s rip off the old trickery.\n- Revert \u0027Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174\u0027 (bsc#1051510).\n- Revert \u0027Remove patces for bug 1087405 due to regression\u0027 This reverts commit f91a2ea5192d9e933c41600da5d1543155df381c.\n- Revert \u0027ath10k: send (re)assoc peer command when NSS changed\u0027 (bsc#1051510).\n- Revert \u0027drm/i915/edp: Allow alternate fixed mode for eDP if available.\u0027 (bsc#1093604).\n- Revert \u0027kernel-binary: do not package extract-cert when not signing modules\u0027 This reverts commit 10a8bc496a553b8069d490a8ae7508bdb19f58d9.\n- Revert \u0027rt2800: use TXOP_BACKOFF for probe frames\u0027 (bsc#1051510).\n- Revert \u0027scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte()\u0027 (bsc#1099918).\n- Sort series.conf\n- USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888).\n- USB: serial: pl2303: new device id for Chilitag (bsc#1087092).\n- USB: serial: simple: add Motorola Tetra driver (bsc#1087092).\n- USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bsc#1090888).\n- Update patches.fixes/vti-fix-use-after-free-in-vti_tunnel_xmit-vti6_tnl_x.patch (bsc#1076830 networking-stable-17_10_09).\n- Update patches.suse/ceph-quota-add-counter-for-snaprealms-with-quota.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-add-initial-infrastructure-to-support-cephfs-quotas.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-cache-inode-pointer-in-ceph_snap_realm.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-don-t-allow-cross-quota-renames.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-support-for-ceph-quota-max_bytes.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-support-for-ceph-quota-max_files.patch (bsc#1089115).\n- Update patches.suse/ceph-quota-update-mds-when-max_bytes-is-approaching.patch (bsc#1089115).\n- Update for above change patches.drivers/0003-md-cluster-Suspend-writes-in-RAID10-if-within-range.patch (bsc#1093023).\n- Update patches.suse/ceph-don-t-check-quota-for-snap-inode.patch (bsc#1089115).\n- Update patches.suse/ceph-fix-root-quota-realm-check.patch (bsc#1089115).\n- X.509: fix BUG_ON() when hash algorithm is unsupported (bsc#1051510).\n- X.509: fix NULL dereference when restricting key with unsupported_sig (bsc#1051510).\n- X.509: fix comparisons of -\u003epkey_algo (bsc#1051510).\n- X.509: reject invalid BIT STRING for subjectPublicKey (bsc#1051510).\n- acpi, nfit: quiet invalid block-aperture-region warnings (bsc#1091781).\n- acpi, nfit: rework NVDIMM leaf method detection (bsc#1091782).\n- acpi: Add helper for deactivating memory region (bsc#1100132).\n- acpi: nfit: Add support for detect platform CPU cache flush on power loss (bsc#1091424).\n- acpi: nfit: add persistent memory control flag for nd_region (bsc#1091424).\n- adding missing rcu_read_unlock in ipxip6_rcv (networking-stable-17_12_31).\n- af_netlink: ensure that NLMSG_DONE never fails in dumps (networking-stable-17_11_20).\n- afs: Connect up the CB.ProbeUuid (bsc#1052766).\n- afs: Fix missing error handling in afs_write_end() (bsc#1052766).\n- amd-xgbe: Add pre/post auto-negotiation phy hooks (networking-stable-18_04_26).\n- amd-xgbe: Improve KR auto-negotiation and training (networking-stable-18_04_26).\n- amd-xgbe: Only use the SFP supported transceiver signals (networking-stable-18_04_26).\n- amd-xgbe: Restore PCI interrupt enablement setting on resume (networking-stable-18_03_07).\n- apparmor: fix dangling symlinks to policy rawdata after replacement (bsc#1095893).\n- apparmor: fix display of .ns_name for containers (bsc#1095893).\n- apparmor: fix logging of the existence test for signals (bsc#1095893).\n- apparmor: fix memory leak on buffer on error exit path (bsc#1095893).\n- arch/*: Kconfig: fix documentation for NMI watchdog (bsc#1099918).\n- arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308).\n- arm64: Add \u0027ssbd\u0027 command-line option (bsc#1085308).\n- arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308).\n- arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308).\n- arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308).\n- arm64: alternatives: Add dynamic patching feature (bsc#1085308).\n- arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308).\n- arm64: ssbd: Add global mitigation state accessor (bsc#1085308).\n- arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308).\n- arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308).\n- arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308).\n- arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308).\n- arp: fix arp_filter on l3slave devices (networking-stable-18_04_10).\n- ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bsc#1051510).\n- ath10k: correct target assert problem due to CE5 stuck (bsc#1051510).\n- ath10k: search all IEs for variant before falling back (bsc#1051510).\n- ath9k: fix crash in spectral scan (bsc#1051510).\n- auxdisplay: fix broken menu (bsc#1051510).\n- auxdisplay: img-ascii-lcd: Only build on archs that have IOMEM (bsc#1051510).\n- auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- backlight: as3711_bl: Fix Device Tree node lookup (bsc#1051510).\n- backlight: max8925_bl: Fix Device Tree node lookup (bsc#1051510).\n- backlight: tdo24m: Fix the SPI CS between transfers (bsc#1051510).\n- backlight: tps65217_bl: Fix Device Tree node lookup (bsc#1051510).\n- bcache: Add __printf annotation to __bch_check_keys() (bsc#1093023).\n- bcache: Annotate switch fall-through (bsc#1093023).\n- bcache: Fix a compiler warning in bcache_device_init() (bsc#1093023).\n- bcache: Fix indentation (bsc#1093023).\n- bcache: Fix kernel-doc warnings (bsc#1093023).\n- bcache: Fix, improve efficiency of closure_sync() (bsc#1093023).\n- bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1093023).\n- bcache: Remove an unused variable (bsc#1093023).\n- bcache: Suppress more warnings about set-but-not-used variables (bsc#1093023).\n- bcache: Use PTR_ERR_OR_ZERO() (bsc#1093023).\n- bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1093023).\n- bcache: add backing_request_endio() for bi_end_io (bsc#1093023).\n- bcache: add io_disable to struct cached_dev (bsc#1093023).\n- bcache: add journal statistic (bsc#1093023).\n- bcache: add stop_when_cache_set_failed option to backing device (bsc#1093023).\n- bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1093023).\n- bcache: allow quick writeback when backing idle (bsc#1093023).\n- bcache: closures: move control bits one bit right (bsc#1093023).\n- bcache: comment on direct access to bvec table (bsc#1093023).\n- bcache: correct flash only vols (check all uuids) (bsc#1093023).\n- bcache: count backing device I/O error for writeback I/O (bsc#1093023).\n- bcache: fix cached_dev-\u003ecount usage for bch_cache_set_error() (bsc#1093023).\n- bcache: fix error return value in memory shrink (bsc#1093023).\n- bcache: fix for allocator and register thread race (bsc#1093023).\n- bcache: fix for data collapse after re-attaching an attached device (bsc#1093023).\n- bcache: fix high CPU occupancy during journal (bsc#1093023).\n- bcache: fix inaccurate io state for detached bcache devices (bsc#1093023).\n- bcache: fix incorrect sysfs output value of strip size (bsc#1093023).\n- bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1093023).\n- bcache: fix misleading error message in bch_count_io_errors() (bsc#1093023).\n- bcache: fix unmatched generic_end_io_acct() and generic_start_io_acct() (bsc#1093023).\n- bcache: fix using of loop variable in memory shrink (bsc#1093023).\n- bcache: fix writeback target calc on large devices (bsc#1093023).\n- bcache: fix wrong return value in bch_debug_init() (bsc#1093023).\n- bcache: mark closure_sync() __sched (bsc#1093023).\n- bcache: move closure debug file into debug directory (bsc#1093023).\n- bcache: properly set task state in bch_writeback_thread() (bsc#1093023).\n- bcache: quit dc-\u003ewriteback_thread when BCACHE_DEV_DETACHING is set (bsc#1093023).\n- bcache: reduce cache_set devices iteration by devices_max_used (bsc#1093023).\n- bcache: ret IOERR when read meets metadata error (bsc#1093023).\n- bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1093023).\n- bcache: return attach error when no cache set exist (bsc#1093023).\n- bcache: segregate flash only volume write streams (bsc#1093023).\n- bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1093023).\n- bcache: set dc-\u003eio_disable to true in conditional_stop_bcache_device() (bsc#1093023).\n- bcache: set error_limit correctly (bsc#1093023).\n- bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1093023).\n- bcache: stop dc-\u003ewriteback_rate_update properly (bsc#1093023).\n- bcache: stop writeback thread after detaching (bsc#1093023).\n- bcache: store disk name in struct cache and struct cached_dev (bsc#1093023).\n- bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1093023).\n- bcache: writeback: properly order backing device IO (bsc#1093023).\n- bdi: Fix oops in wb_workfn() (bsc#1052766).\n- bdi: wake up concurrent wb_shutdown() callers (bsc#1052766).\n- be2net: Fix HW stall issue in Lancer (bsc#1086288).\n- be2net: Fix error detection logic for BE3 (bsc#1050252).\n- be2net: Handle transmit completion errors in Lancer (bsc#1086288).\n- bfq-iosched: ensure to clear bic/bfqq pointers when preparing request (bsc#1052766).\n- bfq: Re-enable auto-loading when built as a module (bsc#1099918).\n- bio-integrity: move the bio integrity profile check earlier in bio_integrity_prep (bsc#1093023).\n- bitmap: fix memset optimization on big-endian systems (bsc#1051510).\n- bitops: Introduce assign_bit() (bsc#1093023).\n- blacklist.conf: blacklist further commits not needed (bsc#1085933, bsc#1085938, bsc#1085939)\n- blacklist.conf: blacklist tools specific change bsc#1085941\n- blk-mq-debugfs: fix device sched directory for default scheduler (bsc#1099918).\n- blk-mq: do not keep offline CPUs mapped to hctx 0 (bsc#1099918).\n- blk-mq: make sure hctx-\u003enext_cpu is set correctly (bsc#1099918).\n- blk-mq: make sure that correct hctx-\u003enext_cpu is set (bsc#1099918).\n- blk-mq: reinit q-\u003etag_set_list entry only after grace period (bsc#1099918).\n- blk-mq: simplify queue mapping and schedule with each possisble CPU (bsc#1099918).\n- block, bfq: add missing invocations of bfqg_stats_update_io_add/remove (bsc#1099918).\n- block, bfq: fix occurrences of request finish method\u0027s old name (bsc#1099918).\n- block, bfq: put async queues for root bfq groups too (bsc#1052766).\n- block/loop: fix deadlock after loop_set_status (bsc#1052766).\n- block/swim: Remove extra put_disk() call from error path (bsc#1099918).\n- block: Add comment to submit_bio_wait() (bsc#1093023).\n- block: Fix __bio_integrity_endio() documentation (bsc#1099918).\n- block: Fix cloning of requests with a special payload (bsc#1099918).\n- block: Set BIO_TRACE_COMPLETION on new bio during split (bsc#1052766).\n- block: cope with WRITE ZEROES failing in blkdev_issue_zeroout() (bsc#1099918).\n- block: factor out __blkdev_issue_zero_pages() (bsc#1099918).\n- block: sed-opal: Fix a couple off by one bugs (bsc#1099918).\n- bnx2x: Collect the device debug information during Tx timeout (bsc#1086323).\n- bnx2x: Deprecate pci_get_bus_and_slot() (bsc#1086323).\n- bnx2x: Replace doorbell barrier() with wmb() (bsc#1086323).\n- bnx2x: Use NETIF_F_GRO_HW (bsc#1086323).\n- bnx2x: Use pci_ari_enabled() instead of local copy (bsc#1086323).\n- bnx2x: fix slowpath null crash (bsc#1086323).\n- bnx2x: fix spelling mistake: \u0027registeration\u0027 -\u003e \u0027registration\u0027 (bsc#1086323).\n- bnx2x: use the right constant (bsc#1086323).\n- bnxt_en: Add BCM5745X NPAR device IDs (bsc#1086282).\n- bnxt_en: Add IRQ remapping logic (bsc#1086282).\n- bnxt_en: Add TC to hardware QoS queue mapping logic (bsc#1086282).\n- bnxt_en: Add ULP calls to stop and restart IRQs (bsc#1086282).\n- bnxt_en: Add cache line size setting to optimize performance (bsc#1086282).\n- bnxt_en: Add extended port statistics support (bsc#1086282).\n- bnxt_en: Add support for ndo_set_vf_trust (bsc#1086282).\n- bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282).\n- bnxt_en: Adjust default rings for multi-port NICs (bsc#1086282).\n- bnxt_en: Always forward VF MAC address to the PF (bsc#1086282).\n- bnxt_en: Change IRQ assignment for RDMA driver (bsc#1086282).\n- bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282).\n- bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282).\n- bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282).\n- bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282).\n- bnxt_en: Do not allow VF to read EEPROM (bsc#1086282).\n- bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282).\n- bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282).\n- bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282).\n- bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282).\n- bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282).\n- bnxt_en: Fix ethtool -x crash when device is down (bsc#1086282).\n- bnxt_en: Fix firmware message delay loop regression (bsc#1086282).\n- bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282).\n- bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282).\n- bnxt_en: Forward VF MAC address to the PF (bsc#1086282).\n- bnxt_en: Ignore src port field in decap filter nodes (bsc#1050242).\n- bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282).\n- bnxt_en: Implement new method to reserve rings (bsc#1086282).\n- bnxt_en: Improve resource accounting for SRIOV (bsc#1086282).\n- bnxt_en: Improve ring allocation logic (bsc#1086282).\n- bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282).\n- bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282).\n- bnxt_en: Increase RING_IDLE minimum threshold to 50 (bsc#1086282).\n- bnxt_en: Need to include RDMA rings in bnxt_check_rings() (bsc#1086282).\n- bnxt_en: Pass complete VLAN TCI to the stack (bsc#1086282).\n- bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282).\n- bnxt_en: Refactor bnxt_close_nic() (bsc#1086282).\n- bnxt_en: Refactor bnxt_need_reserve_rings() (bsc#1086282).\n- bnxt_en: Refactor hardware resource data structures (bsc#1086282).\n- bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282).\n- bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282).\n- bnxt_en: Reserve RSS and L2 contexts for VF (bsc#1086282).\n- bnxt_en: Reserve completion rings and MSIX for bnxt_re RDMA driver (bsc#1086282).\n- bnxt_en: Reserve resources for RFS (bsc#1086282).\n- bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282).\n- bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282).\n- bnxt_en: Restore MSIX after disabling SRIOV (bsc#1086282).\n- bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282).\n- bnxt_en: Simplify ring alloc/free error messages (bsc#1086282).\n- bnxt_en: Support max-mtu with VF-reps (bsc#1086282).\n- bnxt_en: Update firmware interface to 1.9.0 (bsc#1086282).\n- bnxt_en: Update firmware interface to 1.9.1.15 (bsc#1086282).\n- bnxt_en: Use a dedicated VNIC mode for RDMA (bsc#1086282).\n- bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282).\n- bnxt_en: do not allow wildcard matches for L2 flows (bsc#1050242).\n- bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282).\n- bnxt_en: fix clear flags in ethtool reset handling (bsc#1050242).\n- bnxt_en: reduce timeout on initial HWRM calls (bsc#1086282).\n- bonding: discard lowest hash bit for 802.3ad layer3+4 (networking-stable-17_11_20).\n- bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (networking-stable-18_04_26).\n- bonding: fix the err path for dev hwaddr sync in bond_enslave (networking-stable-18_04_10).\n- bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (networking-stable-18_04_10).\n- bonding: process the err returned by dev_set_allmulti properly in bond_enslave (networking-stable-18_04_10).\n- bonding: send learning packets for vlans on slave (networking-stable-18_05_15).\n- bpf, ppc64: fix out of bounds access in tail call (bsc#1083647).\n- bpf, x64: fix memleak when not converging after image (bsc#1083647).\n- bpf: add schedule points in percpu arrays management (bsc#1083647).\n- bpf: fix bpf_skb_adjust_net/bpf_skb_proto_xlat to deal with gso sctp skbs (bsc#1076830).\n- bpf: fix mlock precharge on arraymaps (bsc#1083647).\n- bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (bsc#1086282).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- brcmfmac: Fix check for ISO3166 code (bsc#1051510).\n- brd: fix overflow in __brd_direct_access (bsc#1052766).\n- bridge: check iface upper dev when setting master via ioctl (networking-stable-18_05_15).\n- Btrfs: Take trans lock before access running trans in check_delayed_ref (bsc#1097105).\n- Btrfs: return error value if create_io_em failed in cow_file_range (bsc#1097105).\n- can: af_can: can_pernet_init(): add missing error handling for kzalloc returning NULL (bsc#1051510).\n- can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).\n- can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510).\n- can: c_can: do not indicate triple sampling support for D_CAN (bsc#1051510).\n- can: cc770: Fix queue stall and dropped RTR reply (bsc#1051510).\n- can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bsc#1051510).\n- can: cc770: Fix use after free in cc770_tx_interrupt() (bsc#1051510).\n- can: ems_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: esd_usb2: Fix can_dlc value for received RTR, frames (bsc#1051510).\n- can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bsc#1051510).\n- can: flexcan: fix VF610 state transition issue (bsc#1051510).\n- can: flexcan: fix i.MX28 state transition issue (bsc#1051510).\n- can: flexcan: fix i.MX6 state transition issue (bsc#1051510).\n- can: flexcan: fix p1010 state transition issue (bsc#1051510).\n- can: flexcan: fix state transition regression (bsc#1051510).\n- can: flexcan: implement error passive state quirk (bsc#1051510).\n- can: flexcan: rename legacy error state quirk (bsc#1051510).\n- can: gs_usb: fix busy loop if no more TX context is available (bsc#1051510).\n- can: gs_usb: fix return value of the \u0027set_bittiming\u0027 callback (bsc#1051510).\n- can: hi311x: Acquire SPI lock on -\u003edo_get_berr_counter (bsc#1051510).\n- can: hi311x: Work around TX complete interrupt erratum (bsc#1051510).\n- can: ifi: Check core revision upon probe (bsc#1051510).\n- can: ifi: Fix transmitter delay calculation (bsc#1051510).\n- can: ifi: Repair the error handling (bsc#1051510).\n- can: kvaser_usb: Correct return value in printout (bsc#1051510).\n- can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bsc#1051510).\n- can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bsc#1051510).\n- can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bsc#1051510).\n- can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: kvaser_usb: free buf in error paths (bsc#1051510).\n- can: kvaser_usb: ratelimit errors if incomplete messages are received (bsc#1051510).\n- can: mcba_usb: cancel urb on -EPROTO (bsc#1051510).\n- can: mcba_usb: fix device disconnect bug (bsc#1051510).\n- can: peak/pci: fix potential bug when probe() fails (bsc#1051510).\n- can: peak/pcie_fd: fix echo_skb is occupied! bug (bsc#1051510).\n- can: peak/pcie_fd: fix potential bug in restarting tx queue (bsc#1051510).\n- can: peak/pcie_fd: remove useless code when interface starts (bsc#1051510).\n- can: peak: Add support for new PCIe/M2 CAN FD interfaces (bsc#1051510).\n- can: peak: fix potential bug in packet fragmentation (bsc#1051510).\n- can: sun4i: fix loopback mode (bsc#1051510).\n- can: sun4i: handle overrun in RX FIFO (bsc#1051510).\n- can: ti_hecc: Fix napi poll return value for repoll (bsc#1051510).\n- can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bsc#1051510).\n- can: vxcan: improve handling of missing peer name attribute (bsc#1051510).\n- cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (networking-stable-18_04_13).\n- cdrom: information leak in cdrom_ioctl_media_changed() (bsc#1051510).\n- ceph: adding protection for showing cap reservation info (bsc#1089115).\n- ceph: always update atime/mtime/ctime for new inode (bsc#1089115).\n- ceph: change variable name to follow common rule (bsc#1089115).\n- ceph: check if mds create snaprealm when setting quota (bsc#1089115).\n- ceph: do not wait on writeback when there is no more dirty pages (bsc#1089115).\n- ceph: filter out used flags when printing unused open flags (bsc#1089115).\n- ceph: fix alignment of rasize (bsc#1098236).\n- ceph: fix dentry leak in splice_dentry() (bsc#1098236).\n- ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115).\n- ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115).\n- ceph: fix st_nlink stat for directories (bsc#1093904).\n- ceph: fix use-after-free in ceph_statfs() (bsc#1098236).\n- ceph: fix wrong check for the case of updating link count (bsc#1098236).\n- ceph: keep consistent semantic in fscache related option combination (bsc#1089115).\n- ceph: mark the cap cache as unreclaimable (bsc#1089115).\n- ceph: optimize mds session register (bsc#1089115).\n- ceph: optimize memory usage (bsc#1089115).\n- ceph: optimizing cap allocation (bsc#1089115).\n- ceph: optimizing cap reservation (bsc#1089115).\n- ceph: prevent i_version from going back (bsc#1098236).\n- ceph: quota: report root dir quota usage in statfs (bsc#1089115).\n- ceph: release unreserved caps if having enough available caps (bsc#1089115).\n- ceph: return proper bool type to caller instead of pointer (bsc#1089115).\n- ceph: support file lock on directory (bsc#1098236).\n- ceph: use seq_show_option for string type options (bsc#1089115).\n- cfg80211: clear wep keys after disconnection (bsc#1051510).\n- cfg80211: further limit wiphy names to 64 bytes (bsc#1051510).\n- cfg80211: limit wiphy names to 128 bytes (bsc#1051510).\n- cgroup: Fix deadlock in cpu hotplug path (Git-fixes).\n- cgroup: Reinit cgroup_taskset structure before cgroup_migrate_execute() returns (Git-fixes).\n- cifs: Check for timeout on Negotiate stage (bsc#1091171).\n- cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734).\n- config: arm64: enable Spectre-v4 per-thread mitigation\n- coresight: Fix disabling of CoreSight TPIU (bsc#1051510).\n- cpufreq: intel_pstate: Add HWP boost utility and sched util hooks (bsc#1066110).\n- cpufreq: intel_pstate: Fix scaling max/min limits with Turbo 3.0 (bsc#1051510).\n- cpufreq: intel_pstate: HWP boost performance on IO wakeup (bsc#1066110).\n- cpufreq: intel_pstate: New sysfs entry to control HWP boost (bsc#1066110).\n- cpufreq: intel_pstate: enable boost for Skylake Xeon (bsc#1066110).\n- cpufreq: schedutil: Avoid using invalid next_freq (git-fixes).\n- cpuidle: fix broadcast control when broadcast can not be entered (Git-fixes).\n- cros_ec: fix nul-termination for firmware build info (bsc#1051510).\n- crypto: AF_ALG - remove SGL terminator indicator when chaining (bsc#1051510).\n- crypto: aes-generic - build with -Os on gcc-7+ (bsc#1051510).\n- crypto: aes-generic - fix aes-generic regression on powerpc (bsc#1051510).\n- crypto: af_alg - fix possible uninit-value in alg_bind() (bsc#1051510).\n- crypto: ahash - Fix early termination in hash walk (bsc#1051510).\n- crypto: arm,arm64 - Fix random regeneration of S_shipped (bsc#1051510).\n- crypto: atmel-aes - fix the keys zeroing on errors (bsc#1051510).\n- crypto: caam - Fix null dereference at error path (bsc#1051510).\n- crypto: caam - fix DMA mapping dir for generated IV (bsc#1051510).\n- crypto: caam - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: caam - fix incorrect define (bsc#1051510).\n- crypto: caam - strip input zeros from RSA input buffer (bsc#1051510).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).\n- crypto: ccp - Fix sparse, use plain integer as NULL pointer (git-fixes 200664d5237f).\n- crypto: drbg - set freed buffers to NULL (bsc#1051510).\n- crypto: lrw - Free rctx-\u003eext with kzfree (bsc#1051510).\n- crypto: omap-sham - fix memleak (bsc#1051510).\n- crypto: qat - remove unused and redundant pointer vf_info (bsc#1051510).\n- crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bsc#1051510).\n- crypto: vmx - Remove overly verbose printk from AES XTS init (bsc#1051510).\n- crypto: vmx - Remove overly verbose printk from AES init routines (bsc#1051510).\n- crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bsc#1051510).\n- cxgb4: Correct ntuple mask validation for hash filters (bsc#1064802 bsc#1066129).\n- cxgb4: fix error return code in adap_init0() (bsc#1064802 bsc#1066129).\n- cxgb4: fix offset in collecting TX rate limit info (bsc#1073513).\n- cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bsc#1046542).\n- dax, dm: allow device-mapper to operate without dax support (bsc#1093023).\n- dax: check for QUEUE_FLAG_DAX in bdev_dax_supported() (bsc#1101315).\n- dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (networking-stable-18_01_28).\n- dccp: fix tasklet usage (networking-stable-18_05_15).\n- delayacct: Account blkio completion on the correct task (bsc#1052766).\n- dell_rbu: make firmware payload memory uncachable (bsc#1087978).\n- device-dax: allow MAP_SYNC to succeed (bsc#1052766).\n- devlink: Remove redundant free on error path (networking-stable-18_03_28).\n- direct-io: Prevent NULL pointer access in submit_page_section (bsc#1052766).\n- disable patches.drivers/s390-qeth-use-Read-device-to-query-hypervisor-for-MA.patch Backport of mainline commit b7493e91c11a (\u0027s390/qeth: use Read device to query hypervisor for MAC\u0027) changes assigned MAC address (and breaks networking) on one of our machines and it\u0027s not clear which address is actually correct (bsc#1094575).\n- dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594).\n- dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542).\n- dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542).\n- dm btree: fix serious bug in btree_split_beneath() (bsc#1093023).\n- dm bufio: add missed destroys of client mutex (bsc#1093023).\n- dm bufio: check result of register_shrinker() (bsc#1093023).\n- dm bufio: delete outdated comment (bsc#1093023).\n- dm bufio: do not embed a bio in the dm_buffer structure (bsc#1093023).\n- dm bufio: eliminate unnecessary labels in dm_bufio_client_create() (bsc#1093023).\n- dm bufio: fix buffer alignment (bsc#1093023).\n- dm bufio: fix integer overflow when limiting maximum cache size (bsc#1093023).\n- dm bufio: fix shrinker scans when (nr_to_scan lower than retain_target) (bsc#1093023).\n- dm bufio: get rid of slab cache name allocations (bsc#1093023).\n- dm bufio: move dm-bufio.h to include/linux/ (bsc#1093023).\n- dm bufio: relax alignment constraint on slab cache (bsc#1093023).\n- dm bufio: remove code that merges slab caches (bsc#1093023).\n- dm bufio: reorder fields in dm_buffer structure (bsc#1093023).\n- dm bufio: support non-power-of-two block sizes (bsc#1093023).\n- dm bufio: use REQ_OP_READ and REQ_OP_WRITE (bsc#1093023).\n- dm bufio: use slab cache for dm_buffer structure allocations (bsc#1093023).\n- dm cache background tracker: limit amount of background work that may be issued at once (bsc#1093023).\n- dm cache policy smq: allocate cache blocks in order (bsc#1093023).\n- dm cache policy smq: change max background work from 10240 to 4096 blocks (bsc#1093023).\n- dm cache policy smq: handle races with queuing background_work (bsc#1093023).\n- dm cache policy smq: take origin idle status into account when queuing writebacks (bsc#1093023).\n- dm cache: convert dm_cache_metadata.ref_count from atomic_t to refcount_t (bsc#1093023).\n- dm cache: fix race condition in the writeback mode overwrite_bio optimisation (bsc#1093023).\n- dm cache: lift common migration preparation code to alloc_migration() (bsc#1093023).\n- dm cache: pass cache structure to mode functions (bsc#1093023).\n- dm cache: remove all obsolete writethrough-specific code (bsc#1093023).\n- dm cache: remove usused deferred_cells member from struct cache (bsc#1093023).\n- dm cache: simplify get_per_bio_data() by removing data_size argument (bsc#1093023).\n- dm cache: submit writethrough writes in parallel to origin and cache (bsc#1093023).\n- dm crypt: allow unaligned bv_offset (bsc#1093023).\n- dm crypt: fix crash by adding missing check for auth key size (bsc#1093023).\n- dm crypt: fix error return code in crypt_ctr() (bsc#1093023).\n- dm crypt: fix memory leak in crypt_ctr_cipher_old() (bsc#1093023).\n- dm crypt: limit the number of allocated pages (bsc#1093023).\n- dm crypt: reject sector_size feature if device length is not aligned to it (bsc#1093023).\n- dm crypt: remove BIOSET_NEED_RESCUER flag (bsc#1093023).\n- dm crypt: wipe kernel key copy after IV initialization (bsc#1093023).\n- dm flakey: check for null arg_name in parse_features() (bsc#1093023).\n- dm integrity: allow unaligned bv_offset (bsc#1093023).\n- dm integrity: count and display checksum failures (bsc#1093023).\n- dm integrity: do not check integrity for failed read operations (bsc#1093023).\n- dm integrity: do not store cipher request on the stack (bsc#1093023).\n- dm integrity: fail early if required HMAC key is not available (bsc#1093023).\n- dm integrity: make blk_integrity_profile structure const (bsc#1093023).\n- dm integrity: optimize writing dm-bufio buffers that are partially changed (bsc#1093023).\n- dm integrity: use init_completion instead of COMPLETION_INITIALIZER_ONSTACK (bsc#1093023).\n- dm integrity: use kvfree for kvmalloc\u0027d memory (bsc#1099918).\n- dm io: remove BIOSET_NEED_RESCUER flag from bios bioset (bsc#1093023).\n- dm ioctl: constify ioctl lookup table (bsc#1093023).\n- dm log writes: add support for DAX (bsc#1093023).\n- dm log writes: add support for inline data buffers (bsc#1093023).\n- dm log writes: do not use all the cpu while waiting to log blocks (bsc#1093023).\n- dm log writes: fix \u003e512b sectorsize support (bsc#1093023).\n- dm log writes: fix max length used for kstrndup (bsc#1093023).\n- dm log writes: record metadata flag for better flags record (bsc#1093023).\n- dm mpath: fix bio-based multipath queue_if_no_path handling (bsc#1099918).\n- dm raid: add component device size checks to avoid runtime failure (bsc#1093023).\n- dm raid: avoid passing array_in_sync variable to raid_status() callees (bsc#1093023).\n- dm raid: bump target version to reflect numerous fixes (bsc#1093023).\n- dm raid: consume sizes after md_finish_reshape() completes changing them (bsc#1093023).\n- dm raid: correct resizing state relative to reshape space in ctr (bsc#1093023).\n- dm raid: display a consistent copy of the MD status via raid_status() (bsc#1093023).\n- dm raid: do not use \u0027const\u0027 in function return (bsc#1099918).\n- dm raid: ensure \u0027a\u0027 chars during reshape (bsc#1093023).\n- dm raid: fix deadlock caused by premature md_stop_writes() (bsc#1093023).\n- dm raid: fix incorrect status output at the end of a \u0027recover\u0027 process (bsc#1093023).\n- dm raid: fix incorrect sync_ratio when degraded (bsc#1093023).\n- dm raid: fix nosync status (bsc#1093023).\n- dm raid: fix panic when attempting to force a raid to sync (bsc#1093023).\n- dm raid: fix parse_raid_params() variable range issue (bsc#1093023).\n- dm raid: fix raid set size revalidation (bsc#1093023).\n- dm raid: fix raid_resume() to keep raid set frozen as needed (bsc#1093023).\n- dm raid: fix rs_get_progress() synchronization state/ratio (bsc#1093023).\n- dm raid: make raid_sets symbol static (bsc#1093023).\n- dm raid: simplify rs_get_progress() (bsc#1093023).\n- dm raid: small cleanup and remove unsed \u0027struct raid_set\u0027 member (bsc#1093023).\n- dm raid: stop keeping raid set frozen altogether (bsc#1093023).\n- dm raid: use rs_is_raid*() (bsc#1093023).\n- dm raid: validate current raid sets redundancy (bsc#1093023).\n- dm rq: do not update rq partially in each ending bio (bsc#1093023).\n- dm rq: make dm-sq requeuing behavior consistent with dm-mq behavior (bsc#1093023).\n- dm space map metadata: use ARRAY_SIZE (bsc#1093023).\n- dm stripe: get rid of a Variable Length Array (VLA) (bsc#1093023).\n- dm table: fix regression from improper dm_dev_internal.count refcount_t conversion (bsc#1093023).\n- dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bsc#1093023).\n- dm thin: fix trailing semicolon in __remap_and_issue_shared_cell (bsc#1093023).\n- dm zoned: avoid triggering reclaim from inside dmz_map() (bsc#1099918).\n- dm zoned: ignore last smaller runt zone (bsc#1093023).\n- dm-crypt: do not clear bvec-\u003ebv_page in crypt_free_buffer_pages() (bsc#1093023).\n- dm-crypt: do not mess with BIP_BLOCK_INTEGRITY (bsc#1093023).\n- dm-raid: fix a race condition in request handling (bsc#1093023).\n- dm: backfill missing calls to mutex_destroy() (bsc#1093023).\n- dm: clear all discard attributes in queue_limits when discards are disabled (bsc#1093023).\n- dm: convert DM printk macros to pr level macros (bsc#1099918).\n- dm: convert dm_dev_internal.count from atomic_t to refcount_t (bsc#1093023).\n- dm: convert table_device.count from atomic_t to refcount_t (bsc#1093023).\n- dm: correctly handle chained bios in dec_pending() (bsc#1093023).\n- dm: discard support requires all targets in a table support discards (bsc#1093023).\n- dm: do not set \u0027discards_supported\u0027 in targets that do not need it (bsc#1093023).\n- dm: ensure bio submission follows a depth-first tree walk (bsc#1093023).\n- dm: ensure bio-based DM\u0027s bioset and io_pool support targets\u0027 maximum IOs (bsc#1093023).\n- dm: fix __send_changing_extent_only() to send first bio and chain remainder (bsc#1093023).\n- dm: fix comment above dm_accept_partial_bio (bsc#1093023).\n- dm: fix printk() rate limiting code (bsc#1099918).\n- dm: fix various targets to dm_register_target after module __init resources created (bsc#1093023).\n- dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE (bsc#1093023).\n- dm: move dm_table_destroy() to same header as dm_table_create() (bsc#1093023).\n- dm: remove BIOSET_NEED_RESCUER based dm_offload infrastructure (bsc#1093023).\n- dm: remove stale comment blocks (bsc#1093023).\n- dm: remove unused \u0027num_write_bios\u0027 target interface (bsc#1093023).\n- dm: remove unused macro DM_MOD_NAME_SIZE (bsc#1093023).\n- dm: rename \u0027bio\u0027 member of dm_io structure to \u0027orig_bio\u0027 (bsc#1093023).\n- dm: safely allocate multiple bioset bios (bsc#1093023).\n- dm: set QUEUE_FLAG_DAX accordingly in dm_table_set_restrictions() (bsc#1093023).\n- dm: simplify start of block stats accounting for bio-based (bsc#1093023).\n- dm: small cleanup in dm_get_md() (bsc#1093023).\n- dm: use bio_split() when splitting out the already processed bio (bsc#1099918).\n- dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bsc#1051510).\n- dmaengine: at_xdmac: fix rare residue corruption (bsc#1051510).\n- dmaengine: dmatest: fix container_of member in dmatest_callback (bsc#1051510).\n- dmaengine: dmatest: move callback wait queue to thread context (bsc#1051510).\n- dmaengine: dmatest: warn user when dma test times out (bsc#1051510).\n- dmaengine: edma: Align the memcpy acnt array size with the transfer (bsc#1051510).\n- dmaengine: ioat: Fix error handling path (bsc#1051510).\n- dmaengine: jz4740: disable/unprepare clk if probe fails (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bsc#1051510).\n- dmaengine: ti-dma-crossbar: Fix possible race condition with dma_inuse (bsc#1051510).\n- docs: disable KASLR when debugging kernel (bsc#1051510).\n- dpaa_eth: increment the RX dropped counter when needed (networking-stable-18_03_28).\n- dpaa_eth: remove duplicate increment of the tx_errors counter (networking-stable-18_03_28).\n- dpaa_eth: remove duplicate initialization (networking-stable-18_03_28).\n- drbd: Fix drbd_request_prepare() discard handling (bsc#1099918).\n- driver core: Do not ignore class_dir_create_and_add() failure (bsc#1051510).\n- driver core: Move device_links_purge() after bus_remove_device() (bsc#1099918).\n- drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (bsc#1046306).\n- drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bsc#1046306).\n- drivers: net: bnx2x: use setup_timer() helper (bsc#1086323).\n- drm/amd/powerplay: Fix enum mismatch (bsc#1051510).\n- drm/amdgpu/sdma: fix mask in emit_pipeline_sync (bsc#1051510).\n- drm/amdgpu/si: implement get/set pcie_lanes asic callback (bsc#1051510).\n- drm/amdgpu: Add APU support in vi_set_uvd_clocks (bsc#1051510).\n- drm/amdgpu: Add APU support in vi_set_vce_clocks (bsc#1051510).\n- drm/amdgpu: Add an ATPX quirk for hybrid laptop (bsc#1051510).\n- drm/amdgpu: Fix PCIe lane width calculation (bsc#1051510).\n- drm/amdgpu: Fix always_valid bos multiple LRU insertions (bsc#1051510).\n- drm/amdgpu: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/amdgpu: Use kvmalloc_array for allocating VRAM manager nodes array (bsc#1051510).\n- drm/amdgpu: adjust timeout for ib_ring_tests(v2) (bsc#1051510).\n- drm/amdgpu: disable GFX ring and disable PQ wptr in hw_fini (bsc#1051510).\n- drm/amdgpu: set COMPUTE_PGM_RSRC1 for SGPR/VGPR clearing shaders (bsc#1051510).\n- drm/amdkfd: fix clock counter retrieval for node without GPU (bsc#1051510).\n- drm/armada: fix leak of crtc structure (bsc#1051510).\n- drm/ast: Fixed 1280x800 Display Issue (bsc#1051510).\n- drm/atmel-hlcdc: check stride values in the first plane (bsc#1051510).\n- drm/atomic: Clean old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).\n- drm/atomic: Clean private obj old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510).\n- drm/bridge: analogix dp: Fix runtime PM state in get_modes() callback (bsc#1051510).\n- drm/bridge: tc358767: do no fail on hi-res displays (bsc#1051510).\n- drm/bridge: tc358767: filter out too high modes (bsc#1051510).\n- drm/bridge: tc358767: fix 1-lane behavior (bsc#1051510).\n- drm/bridge: tc358767: fix AUXDATAn registers access (bsc#1051510).\n- drm/bridge: tc358767: fix DP0_MISC register set (bsc#1051510).\n- drm/bridge: tc358767: fix timing calculations (bsc#1051510).\n- drm/bridge: vga-dac: Fix edid memory leak (bsc#1051510).\n- drm/dumb-buffers: Integer overflow in drm_mode_create_ioctl() (bsc#1051510).\n- drm/exynos/dsi: mask frame-done interrupt (bsc#1051510).\n- drm/exynos: Allow DRM_EXYNOS on s5pv210 (bsc#1051510).\n- drm/exynos: Fix default value for zpos plane property (bsc#1051510).\n- drm/exynos: fix comparison to bitshift when dealing with a mask (bsc#1051510).\n- drm/exynos: g2d: use monotonic timestamps (bsc#1051510).\n- drm/fsl-dcu: enable IRQ before drm_atomic_helper_resume() (bsc#1051510).\n- drm/hisilicon: Ensure LDI regs are properly configured (bsc#1051510).\n- drm/i915/audio: Fix audio detection issue on GLK (bsc#1051510).\n- drm/i915/audio: set minimum CD clock to twice the BCLK (bsc#1095265).\n- drm/i915/bios: filter out invalid DDC pins from VBT child devices (bsc#1051510).\n- drm/i915/execlists: Use rmb() to order CSB reads (bsc#1051510).\n- drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk (bsc#1051510).\n- drm/i915/glk: Add MODULE_FIRMWARE for Geminilake (bsc#1095265).\n- drm/i915/gvt: fix memory leak of a cmd_entry struct on error exit path (bsc#1051510).\n- drm/i915/gvt: throw error on unhandled vfio ioctls (bsc#1051510).\n- drm/i915/lvds: Move acpi lid notification registration to registration phase (bsc#1051510).\n- drm/i915/psr: Chase psr.enabled only under the psr.lock (bsc#1051510).\n- drm/i915/userptr: reject zero user_size (bsc#1051510).\n- drm/i915: Adjust eDP\u0027s logical vco in a reliable place (bsc#1095265).\n- drm/i915: Apply batch location restrictions before pinning (bsc#1051510).\n- drm/i915: Call i915_perf_fini() on init_hw error unwind (bsc#1051510).\n- drm/i915: Disable LVDS on Radiant P845 (bsc#1051510).\n- drm/i915: Do no use kfree() to free a kmem_cache_alloc() return value (bsc#1051510).\n- drm/i915: Do not request a bug report for unsafe module parameters (bsc#1051510).\n- drm/i915: Enable display WA#1183 from its correct spot (bsc#1051510).\n- drm/i915: Enable provoking vertex fix on Gen9 systems (bsc#1051510).\n- drm/i915: Fix LSPCON TMDS output buffer enabling from low-power state (bsc#1051510).\n- drm/i915: Fix context ban and hang accounting for client (bsc#1051510).\n- drm/i915: Fix drm:intel_enable_lvds ERROR message in kernel log (bsc#1051510).\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510).\n- drm/i915: Remove unbannable context spam from reset (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: Restore planes after load detection (bsc#1051510).\n- drm/i915: Try GGTT mmapping whole object as partial (bsc#1051510).\n- drm/imx: move arming of the vblank event to atomic_flush (bsc#1051510).\n- drm/meson: Fix an un-handled error path in \u0027meson_drv_bind_master()\u0027 (bsc#1051510).\n- drm/meson: Fix some error handling paths in \u0027meson_drv_bind_master()\u0027 (bsc#1051510).\n- drm/meson: fix vsync buffer update (bsc#1051510).\n- drm/msm/dsi: use correct enum in dsi_get_cmd_fmt (bsc#1051510).\n- drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1051510).\n- drm/msm: do not deref error pointer in the msm_fbdev_create error path (bsc#1100209).\n- drm/msm: fix leak in failed get_pages (bsc#1051510).\n- drm/nouveau/bar/gf100: add config option to limit BAR2 to 16MiB (bsc#1095094).\n- drm/nouveau/bios/iccsense: rails for power sensors have a mask of 0xf8 for version 0x10 (bsc#1095094).\n- drm/nouveau/bios/init: add a new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/bios/init: add or/link args separate from output path (bsc#1095094).\n- drm/nouveau/bios/init: bump script offset to 32-bits (bsc#1095094).\n- drm/nouveau/bios/init: remove internal use of nvbios_init.bios (bsc#1095094).\n- drm/nouveau/bios/init: rename \u0027crtc\u0027 to \u0027head\u0027 (bsc#1095094).\n- drm/nouveau/bios/init: rename nvbios_init() to nvbios_devinit() (bsc#1095094).\n- drm/nouveau/bios/volt: Parse min and max for Version 0x40 (bsc#1095094).\n- drm/nouveau/bios: Demote missing fp table message to NV_DEBUG (bsc#1095094).\n- drm/nouveau/bl: fix backlight regression (bsc#1095094).\n- drm/nouveau/devinit: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/disp/dp: determine a failsafe link training rate (bsc#1095094).\n- drm/nouveau/disp/dp: determine link bandwidth requirements from head state (bsc#1095094).\n- drm/nouveau/disp/dp: no need for lt_state except during manual link training (bsc#1095094).\n- drm/nouveau/disp/dp: only check for re-train when the link is active (bsc#1095094).\n- drm/nouveau/disp/dp: remove DP_PWR method (bsc#1095094).\n- drm/nouveau/disp/dp: store current link configuration in nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/dp: train link only when actively displaying an image (bsc#1095094).\n- drm/nouveau/disp/dp: use cached link configuration when checking link status (bsc#1095094).\n- drm/nouveau/disp/dp: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/disp/g84-: Extend NVKM HDMI power control method to set InfoFrames (bsc#1095094).\n- drm/nouveau/disp/g84-: port OR HDMI control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g84-gt200: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP drive setting control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP lane mapping to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP link power control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP link setup to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/g94-: port OR DP training pattern control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gf119-: avoid creating non-existent heads (bsc#1095094).\n- drm/nouveau/disp/gf119-: port OR DP VCPI control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gf119: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/gf119: add missing drive vfunc ptr (bsc#1095094).\n- drm/nouveau/disp/gk104-: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/gm200-: allow non-identity mapping of SOR != macro links (bsc#1095094).\n- drm/nouveau/disp/gt215-: port HDA ELD controls to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/gt215: Use supplied HDMI InfoFrames (bsc#1095094).\n- drm/nouveau/disp/nv04: avoid creation of output paths (bsc#1095094).\n- drm/nouveau/disp/nv50-: avoid creating ORs that are not present on HW (bsc#1095094).\n- drm/nouveau/disp/nv50-: execute supervisor on its own workqueue (bsc#1095094).\n- drm/nouveau/disp/nv50-: fetch head/OR state at beginning of supervisor (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 1.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.1 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 2.2 (bsc#1095094).\n- drm/nouveau/disp/nv50-: implement a common supervisor 3.0 (bsc#1095094).\n- drm/nouveau/disp/nv50-: port OR manual sink detection to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/nv50-: port OR power state control to nvkm_ior (bsc#1095094).\n- drm/nouveau/disp/nv50-gt21x: remove workaround for dp-\u003etmds hotplug issues (bsc#1095094).\n- drm/nouveau/disp: Add mechanism to convert HDMI InfoFrames to hardware format (bsc#1095094).\n- drm/nouveau/disp: Silence DCB warnings (bsc#1095094).\n- drm/nouveau/disp: add tv encoders to output resource mapping (bsc#1095094).\n- drm/nouveau/disp: common implementation of scanoutpos method in nvkm_head (bsc#1095094).\n- drm/nouveau/disp: delay output path / connector construction until oneinit() (bsc#1095094).\n- drm/nouveau/disp: fork off some new hw-specific implementations (bsc#1095094).\n- drm/nouveau/disp: identity-map display paths to output resources (bsc#1095094).\n- drm/nouveau/disp: introduce acquire/release display path methods (bsc#1095094).\n- drm/nouveau/disp: introduce input/output resource abstraction (bsc#1095094).\n- drm/nouveau/disp: introduce object to track per-head functions/state (bsc#1095094).\n- drm/nouveau/disp: move vblank_{get,put} methods into nvkm_head (bsc#1095094).\n- drm/nouveau/disp: remove hw-specific customisation of output paths (bsc#1095094).\n- drm/nouveau/disp: rename nvkm_output to nvkm_outp (bsc#1095094).\n- drm/nouveau/disp: rename nvkm_output_dp to nvkm_dp (bsc#1095094).\n- drm/nouveau/disp: s/nvkm_connector/nvkm_conn/ (bsc#1095094).\n- drm/nouveau/disp: shuffle functions around (bsc#1095094).\n- drm/nouveau/falcon: use a more reasonable msgqueue timeout value (bsc#1095094).\n- drm/nouveau/fb/gf100-: zero mmu debug buffers (bsc#1095094).\n- drm/nouveau/fb/ram/nv40-: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/fbcon: fix oops without fbdev emulation (bsc#1094751).\n- drm/nouveau/hwmon: Add config for all sensors and their settings (bsc#1095094).\n- drm/nouveau/hwmon: Add nouveau_hwmon_ops structure with .is_visible/.read_string (bsc#1095094).\n- drm/nouveau/hwmon: Change permissions to numeric (bsc#1095094).\n- drm/nouveau/hwmon: Remove old code, add .write/.read operations (bsc#1095094).\n- drm/nouveau/hwmon: expose the auto_point and pwm_min/max attrs (bsc#1095094).\n- drm/nouveau/kms/nv04-nv40: improve overlay error detection, fix pitch setting (bsc#1095094).\n- drm/nouveau/kms/nv04-nv40: prevent undisplayable framebuffers from creation (bsc#1095094).\n- drm/nouveau/kms/nv04-nv4x: fix exposed format list (bsc#1095094).\n- drm/nouveau/kms/nv04: use new devinit script interpreter entry-point (bsc#1095094).\n- drm/nouveau/kms/nv10-nv40: add NV21 support to overlay (bsc#1095094).\n- drm/nouveau/mc/gf100: add pmu to reset mask (bsc#1095094).\n- drm/nouveau/mpeg: print more debug info when rejecting dma objects (bsc#1095094).\n- drm/nouveau/pmu/fuc: do not use movw directly anymore (bsc#1051510).\n- drm/nouveau/pmu/gt215-: abstract detection of whether reset is needed (bsc#1095094).\n- drm/nouveau/pmu/gt215: fix reset (bsc#1095094).\n- drm/nouveau/tegra: Do not leave GPU in reset (bsc#1095094).\n- drm/nouveau/tegra: Skip manual unpowergating when not necessary (bsc#1095094).\n- drm/nouveau/therm/gm200: Added (bsc#1095094).\n- drm/nouveau/therm: fix spelling mistake on array thresolds (bsc#1095094).\n- drm/nouveau/tmr: remove nvkm_timer_alarm_cancel() (bsc#1095094).\n- drm/nouveau: Clean up nv50_head_atomic_check_mode() and fix blankus calculation (bsc#1095094).\n- drm/nouveau: Convert nouveau to use new iterator macros, v2 (bsc#1095094).\n- drm/nouveau: Drop drm_vblank_cleanup (bsc#1095094).\n- drm/nouveau: Enable stereoscopic 3D output over HDMI (bsc#1095094).\n- drm/nouveau: Fix deadlock in nv50_mstm_register_connector() (bsc#1051510).\n- drm/nouveau: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/nouveau: Fix merge commit (bsc#1095094).\n- drm/nouveau: Handle drm_atomic_helper_swap_state failure (bsc#1095094).\n- drm/nouveau: Handle frame-packing mode geometry and timing effects (bsc#1095094).\n- drm/nouveau: Pass mode-dependent AVI and Vendor HDMI InfoFrames to NVKM (bsc#1095094).\n- drm/nouveau: Skip vga_fini on non-PCI device (bsc#1095094).\n- drm/nouveau: Use the drm_driver.dumb_destroy default (bsc#1095094).\n- drm/nouveau: silence suspend/resume debugging messages (bsc#1095094).\n- drm/nouveau: use drm_for_each_connector_iter() (bsc#1095094).\n- drm/omap: DMM: Check for DMM readiness after successful transaction commit (bsc#1051510).\n- drm/omap: fix possible NULL ref issue in tiler_reserve_2d (bsc#1051510).\n- drm/omap: fix uninitialized ret variable (bsc#1051510).\n- drm/omap: handle alloc failures in omap_connector (bsc#1051510).\n- drm/omap: silence unititialized variable warning (bsc#1051510).\n- drm/panel: simple: Fix the bus format for the Ontat panel (bsc#1051510).\n- drm/psr: Fix missed entry in PSR setup time table (bsc#1051510).\n- drm/qxl: Call qxl_bo_unref outside atomic context (bsc#1051510).\n- drm/radeon: Fix PCIe lane width calculation (bsc#1051510).\n- drm/radeon: Fix deadlock on runtime suspend (bsc#1051510).\n- drm/radeon: add PX quirk for Asus K73TK (bsc#1051510).\n- drm/radeon: make MacBook Pro d3_delay quirk more generic (bsc#1051510).\n- drm/rockchip: Clear all interrupts before requesting the IRQ (bsc#1051510).\n- drm/rockchip: Respect page offset for PRIME mmap calls (bsc#1051510).\n- drm/rockchip: dw-mipi-dsi: fix possible un-balanced runtime PM enable (bsc#1051510).\n- drm/sun4i: Fix dclk_set_phase (bsc#1051510).\n- drm/sun4i: Fix error path handling (bsc#1051510).\n- drm/tegra: Shutdown on driver unbind (bsc#1051510).\n- drm/tilcdc: ensure nonatomic iowrite64 is not used (bsc#1051510).\n- drm/vc4: Fix memory leak during BO teardown (bsc#1051510).\n- drm/vc4: Fix scaling of uni-planar formats (bsc#1051510).\n- drm/virtio: fix vq wait_event condition (bsc#1051510).\n- drm/vmwgfx: Fix 32-bit VMW_PORT_HB_[IN|OUT] macros (bsc#1051510).\n- drm/vmwgfx: Fix a buffer object leak (bsc#1051510).\n- drm/vmwgfx: Set dmabuf_size when vmw_dmabuf_init is successful (bsc#1051510).\n- drm/vmwgfx: Unpin the screen object backup buffer when not used (bsc#1051510).\n- drm: Allow determining if current task is output poll worker (bsc#1051510).\n- drm: Match sysfs name in link removal to link creation (bsc#1051510).\n- drm: bridge: dw-hdmi: Fix overflow workaround for Amlogic Meson GX SoCs (bsc#1051510).\n- drm: nouveau: remove dead code and pointless local lut storage (bsc#1095094).\n- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen2 (bsc#1051510).\n- drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen3 (bsc#1051510).\n- drm: set FMODE_UNSIGNED_OFFSET for drm files (bsc#1051510).\n- e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876).\n- eCryptfs: do not pass up plaintext names when using filename encryption (bsc#1052766).\n- earlycon: Use a pointer table to fix __earlycon_table stride (bsc#1099918).\n- efi/esrt: Use memunmap() instead of kfree() to free the remapping (bsc#1051510).\n- emulex/benet: Constify *be_misconfig_evt_port_state (bsc#1086288).\n- ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282).\n- ethernet: Use octal not symbolic permissions (bsc#1086288).\n- ethtool: do not print warning for applications using legacy API (networking-stable-18_01_12).\n- etnaviv: fix gem object list corruption (bsc#1051510).\n- etnaviv: fix submit error path (bsc#1051510).\n- ext4: add bounds checking to ext4_xattr_find_entry() (bsc#1052766).\n- ext4: do not update checksum of new initialized bitmaps (bsc#1052766).\n- ext4: eliminate sleep from shutdown ioctl (bsc#1052766).\n- ext4: fix hole length detection in ext4_ind_map_blocks() (bsc#1090953).\n- ext4: fix offset overflow on 32-bit archs in ext4_iomap_begin() (bsc#1079747).\n- ext4: fix unsupported feature message formatting (bsc#1098435).\n- ext4: move call to ext4_error() into ext4_xattr_check_block() (bsc#1052766).\n- ext4: pass -ESHUTDOWN code to jbd2 layer (bsc#1052766).\n- ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bsc#1052766).\n- ext4: protect i_disksize update by i_data_sem in direct write path (bsc#1052766).\n- ext4: set h_journal if there is a failure starting a reserved handle (bsc#1052766).\n- ext4: shutdown should not prevent get_write_access (bsc#1052766).\n- extcon: intel-cht-wc: Set direction and drv flags for V5 boost GPIO (bsc#1051510).\n- f2fs: avoid hungtask when GC encrypted block if io_bits is set (bsc#1052766).\n- f2fs: expose some sectors to user in inline data or dentry case (bsc#1052766).\n- f2fs: fix a panic caused by NULL flush_cmd_control (bsc#1086400).\n- f2fs: fix heap mode to reset it back (bsc#1052766).\n- f2fs: fix to clear CP_TRIMMED_FLAG (bsc#1052766).\n- f2fs: fix to wake up all sleeping flusher (bsc#1099918).\n- fanotify: fix logic of events on child (bsc#1052766).\n- fbdev: controlfb: Add missing modes to fix out of bounds access (bsc#1051510).\n- fealnx: Fix building error on MIPS (networking-stable-17_11_20).\n- fib_semantics: Do not match route with mismatching tclassid (networking-stable-18_03_07).\n- firewire-ohci: work around oversized DMA reads on JMicron controllers (bsc#1051510).\n- firmware: add helper to unregister pm ops (bsc#1085937).\n- firmware: always enable the reboot notifier (bsc#1085937).\n- firmware: dmi_scan: Fix UUID length safety check (bsc#1051510).\n- firmware: dmi_scan: Fix handling of empty DMI strings (bsc#1051510).\n- firmware: fix capturing errors on fw_cache_init() on early init (bsc#1085937).\n- firmware: fix checking for return values for fw_add_devm_name() (bsc#1051510).\n- firmware: fix detecting error on register_reboot_notifier() (bsc#1085936).\n- firmware: move kill_requests_without_uevent() up above (bsc#1085937).\n- firmware: provide helpers for registering the syfs loader (bsc#1085937).\n- firmware: share fw fallback killing on reboot/suspend (bsc#1085937).\n- flow_dissector: properly cap thoff field (networking-stable-18_01_28).\n- fs/aio: Add explicit RCU grace period when freeing kioctx (bsc#1088722).\n- fs/aio: Use RCU accessors for kioctx_table-\u003etable[] (bsc#1088722).\n- fs/binfmt_misc.c: do not allow offset overflow (bsc#1099142).\n- fs/fat/inode.c: fix sb_rdonly() change (bsc#1052766).\n- fs/reiserfs/journal.c: add missing resierfs_warning() arg (bsc#1052766).\n- fsnotify: Fix fsnotify_mark_connector race (bsc#1052766).\n- fsnotify: Hide kABI changes in fsnotify_mark_connector (bsc#1052766).\n- ftrace: Fix selftest goto location on error (bsc#1099918).\n- fuse: fix READDIRPLUS skipping an entry (bsc#1088690).\n- geneve: Fix function matching VNI and tunnel ID on big-endian (bsc#1051510).\n- geneve: fix fill_info when link down (bsc#1051510).\n- gfs2: Fix debugfs glocks dump (bsc#1052766).\n- gpio: No NULL owner (bsc#1051510).\n- gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bsc#1051510).\n- gpio: davinci: Assign first bank regs for unbanked case (bsc#1051510).\n- gpio: fix \u0027gpio-line-names\u0027 property retrieval (bsc#1051510).\n- gpio: fix aspeed_gpio unmask irq (bsc#1051510).\n- gpio: fix error path in lineevent_create (bsc#1051510).\n- gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- gpio: label descriptors using the device name (bsc#1051510).\n- gpio: stmpe: i2c transfer are forbiden in atomic context (bsc#1051510).\n- gpioib: do not free unrequested descriptors (bsc#1051510).\n- gpu: ipu-v3: pre: fix device node leak in ipu_pre_lookup_by_phandle (bsc#1051510).\n- gpu: ipu-v3: prg: avoid possible array underflow (bsc#1051510).\n- gpu: ipu-v3: prg: fix device node leak in ipu_prg_lookup_by_phandle (bsc#1051510).\n- hdlc_ppp: carrier detect ok, do not turn off negotiation (networking-stable-18_03_07).\n- hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1094420).\n- hwmon: (ina2xx) Fix access to uninitialized mutex (bsc#1051510).\n- hwmon: (ina2xx) Make calibration register value fixed (bsc#1051510).\n- hwmon: (jc42) optionally try to disable the SMBUS timeout (bsc#1051510).\n- hwmon: (nct6775) Fix writing pwmX_mode (bsc#1051510).\n- hwmon: (pmbus/adm1275) Accept negative page register values (bsc#1051510).\n- hwmon: (pmbus/max8688) Accept negative page register values (bsc#1051510).\n- hwtracing: stm: fix build error on some arches (bsc#1051510).\n- i2c: designware: fix poll-after-enable regression (bsc#1051510).\n- i2c: i801: Restore configuration at shutdown (bsc#1051510).\n- i2c: i801: Save register SMBSLVCMD value only once (bsc#1051510).\n- i2c: ismt: Separate I2C block read from SMBus block read (bsc#1051510).\n- i2c: mv64xxx: Apply errata delay only in standard mode (bsc#1051510).\n- i2c: pmcmsp: fix error return from master_xfer (bsc#1051510).\n- i2c: pmcmsp: return message count on master_xfer success (bsc#1051510).\n- i2c: viperboard: return message count on master_xfer success (bsc#1051510).\n- i40e: Close client on suspend and restore client MSIx on resume (bsc#1088821).\n- i40e: Do not allow use more TC queue pairs than MSI-X vectors exist (bsc#1094978).\n- i40e: Fix attach VF to VM issue (bsc#1056658 bsc#1056662).\n- i40e: Fix the number of queues available to be mapped for use (bsc#1094978).\n- i40e: program fragmented IPv4 filter input set (bsc#1056658 bsc#1056662).\n- i40evf: Do not schedule reset_task when device is being removed (bsc#1056658 bsc#1056662).\n- i40evf: do not rely on netif_running() outside rtnl_lock() (bsc#1056658 bsc#1056662).\n- i40evf: ignore link up if not running (bsc#1056658 bsc#1056662).\n- i40iw: Zero-out consumer key on allocate stag for FMR (bsc#1058659).\n- ibmvnic: Check CRQ command return codes (bsc#1094840).\n- ibmvnic: Create separate initialization routine for resets (bsc#1094840).\n- ibmvnic: Fix non-fatal firmware error reset (bsc#1093990).\n- ibmvnic: Fix partial success login retries (bsc#1094840).\n- ibmvnic: Fix statistics buffers memory leak (bsc#1093990).\n- ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990).\n- ibmvnic: Handle error case when setting link state (bsc#1094840).\n- ibmvnic: Introduce active CRQ state (bsc#1094840).\n- ibmvnic: Introduce hard reset recovery (bsc#1094840).\n- ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840).\n- ibmvnic: Only do H_EOI for mobility events (bsc#1094356).\n- ibmvnic: Return error code if init interrupted by transport event (bsc#1094840).\n- ibmvnic: Set resetting state at earliest possible point (bsc#1094840).\n- ide: Make ide_cdrom_prep_fs() initialize the sense buffer pointer (bsc#1099918).\n- ide: ide-atapi: fix compile error with defining macro DEBUG (bsc#1099918).\n- ide:ide-cd: fix kernel panic resulting from missing scsi_req_init (bsc#1099918).\n- idr: fix invalid ptr dereference on item delete (bsc#1051510).\n- ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (networking-stable-18_03_28).\n- igb: Allow to remove administratively set MAC on VFs (bsc#1056651).\n- igb: Clear TXSTMP when ptp_tx_work() is timeout (bsc#1056651).\n- igb: Fix a test with HWTSTAMP_TX_ON (bsc#1056651 bsc#1056643).\n- iio: ABI: Fix name of timestamp sysfs file (bsc#1051510).\n- iio: ad7793: Fix the serial interface reset (bsc#1051510).\n- iio: ad7793: implement IIO_CHAN_INFO_SAMP_FREQ (bsc#1051510).\n- iio: ad_sigma_delta: Implement a dedicated reset function (bsc#1051510).\n- iio: adc/accel: Fix up module licenses (bsc#1051510).\n- iio: adc: cpcap: fix incorrect validation (bsc#1051510).\n- iio: adc: mcp320x: Fix oops on module unload (bsc#1051510).\n- iio: adc: mcp320x: Fix readout of negative voltages (bsc#1051510).\n- iio: adc: meson-saradc: fix the bit_idx of the adc_en clock (bsc#1051510).\n- iio: adc: stm32: fix scan of multiple channels with DMA (bsc#1051510).\n- iio: adc: ti-ads1015: add 10% to conversion wait time (bsc#1051510).\n- iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of \u0027twl4030_madc_probe()\u0027 (bsc#1051510).\n- iio: adc: twl4030: Fix an error handling path in \u0027twl4030_madc_probe()\u0027 (bsc#1051510).\n- iio: adis_lib: Initialize trigger before requesting interrupt (bsc#1051510).\n- iio: buffer: check if a buffer has been set up when poll is called (bsc#1051510).\n- iio: buffer: fix the function signature to match implementation (bsc#1051510).\n- iio: core: Return error for failed read_reg (bsc#1051510).\n- iio: fix kernel-doc build errors (bsc#1051510).\n- iio: health: max30102: Add power enable parameter to get_temp function (bsc#1051510).\n- iio: health: max30102: Temperature should be in milli Celsius (bsc#1051510).\n- iio: imu: st_lsm6dsx: fix endianness in st_lsm6dsx_read_oneshot() (bsc#1051510).\n- iio: st_pressure: st_accel: Initialise sensor platform data properly (bsc#1051510).\n- iio: st_pressure: st_accel: pass correct platform data to init (bsc#1051510).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).\n- iio: trigger: stm32-timer: preset shouldn\u0027t be buffered (bsc#1051510).\n- iio:buffer: make length types match kfifo types (bsc#1051510).\n- iio:kfifo_buf: check for uint overflow (bsc#1051510).\n- ima: Fallback to the builtin hash algorithm (bsc#1091686).\n- infiniband: drop unknown function from core_priv.h (bsc#1046306).\n- init: fix false positives in W+X checking (bsc#1093721).\n- initial support (display-only) for GP108 (bsc#1095094).\n- intel_th: Use correct device when freeing buffers (bsc#1051510).\n- iommu/amd: Take into account that alloc_dev_data() may return NULL (bsc#975772).\n- iommu/vt-d: Clear pasid table entry when memory unbound (bsc#1087214).\n- iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034).\n- iov_iter: fix memory leak in pipe_get_pages_alloc() (bsc#1092710).\n- iov_iter: fix return type of __pipe_get_pages() (bsc#1092710).\n- ip6_gre: better validate user provided tunnel names (networking-stable-18_04_10).\n- ip6_gre: fix device features for ioctl setup (networking-stable-17_12_31).\n- ip6_gre: init dev-\u003emtu and dev-\u003ehard_header_len correctly (networking-stable-18_01_28).\n- ip6_gre: ip6gre_tap device should keep dst (networking-stable-17_10_09).\n- ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (networking-stable-17_11_14).\n- ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (networking-stable-17_10_09).\n- ip6_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).\n- ip6_tunnel: disable dst caching if tunnel is dual-stack (networking-stable-18_01_12).\n- ip6_tunnel: do not allow loading ip6_tunnel if ipv6 is disabled in cmdline (networking-stable-17_10_09).\n- ip6_vti: adjust vti mtu according to mtu of lower device (bsc#1082869).\n- ip6mr: fix stale iterator (networking-stable-18_02_06).\n- ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (git-fixes).\n- ip_gre: fix IFLA_MTU ignored on NEWLINK (bsc#1076830).\n- ip_tunnel: better validate user provided tunnel names (networking-stable-18_04_10).\n- ipip: only increase err_count for some certain type icmp in ipip_err (networking-stable-17_11_14).\n- ipv4: Fix use-after-free when flushing FIB tables (networking-stable-17_12_31).\n- ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (networking-stable-18_01_28).\n- ipv4: fix fnhe usage by non-cached routes (networking-stable-18_05_15).\n- ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (networking-stable-18_05_15).\n- ipv4: igmp: guard against silly MTU values (bsc#1082869).\n- ipv6 sit: work around bogus gcc-8 -Wrestrict warning (networking-stable-18_03_07).\n- ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (git-fixes).\n- ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (networking-stable-18_04_26).\n- ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (networking-stable-18_03_28).\n- ipv6: fix udpv6 sendmsg crash caused by too small MTU (networking-stable-18_01_28).\n- ipv6: flowlabel: do not leave opt-\u003etot_len with garbage (networking-stable-17_11_14).\n- ipv6: mcast: better catch silly mtu values (networking-stable-17_12_31).\n- ipv6: old_dport should be a __be16 in __ip6_datagram_connect() (networking-stable-18_03_28).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- ipv6: sit: better validate user provided tunnel names (networking-stable-18_04_10).\n- ipv6: sr: fix NULL pointer dereference in seg6_do_srh_encap()- v4 pkts (git-fixes).\n- ipv6: sr: fix NULL pointer dereference when setting encap source address (networking-stable-18_03_28).\n- ipv6: sr: fix TLVs not being copied using setsockopt (networking-stable-18_01_12).\n- ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state (networking-stable-18_03_28).\n- ipv6: sr: fix seg6 encap performances with TSO enabled (networking-stable-18_04_10).\n- ipv6: the entire IPv6 header chain must fit the first fragment (networking-stable-18_04_10).\n- irqchip/gic-v3-its: Ensure nr_ites \u003e= nr_lpis (bsc#1098401).\n- isdn: eicon: fix a missing-check bug (bsc#1051510).\n- iw_cxgb4: Atomically flush per QP HW CQEs (bsc#1046543).\n- iw_cxgb4: Fix an error handling path in \u0027c4iw_get_dma_mr()\u0027 (bsc#1064802 bsc#1066129).\n- iw_cxgb4: print mapped ports correctly (bsc#1046543).\n- iwlmvm: tdls: Check TDLS channel switch support (bsc#1051510).\n- iwlwifi: add a bunch of new 9000 PCI IDs (1051510).\n- iwlwifi: add shared clock PHY config flag for some devices (bsc#1051510).\n- iwlwifi: avoid collecting firmware dump if not loaded (bsc#1051510).\n- iwlwifi: fix non_shared_ant for 9000 devices (bsc#1051510).\n- iwlwifi: fw: harden page loading code (bsc#1051510).\n- iwlwifi: mvm: Correctly set IGTK for AP (bsc#1051510).\n- iwlwifi: mvm: Correctly set the tid for mcast queue (bsc#1051510).\n- iwlwifi: mvm: Direct multicast frames to the correct station (bsc#1051510).\n- iwlwifi: mvm: Fix channel switch for count 0 and 1 (bsc#1051510).\n- iwlwifi: mvm: Increase session protection time after CS (bsc#1051510).\n- iwlwifi: mvm: always init rs with 20mhz bandwidth rates (bsc#1051510).\n- iwlwifi: mvm: clear tx queue id when unreserving aggregation queue (bsc#1051510).\n- iwlwifi: mvm: do not warn in queue sync on RF-kill (bsc#1051510).\n- iwlwifi: mvm: fix \u0027failed to remove key\u0027 message (bsc#1051510).\n- iwlwifi: mvm: fix IBSS for devices that support station type API (bsc#1051510).\n- iwlwifi: mvm: fix TSO with highly fragmented SKBs (bsc#1051510).\n- iwlwifi: mvm: fix TX of CCMP 256 (bsc#1051510).\n- iwlwifi: mvm: fix array out of bounds reference (bsc#1051510).\n- iwlwifi: mvm: fix assert 0x2B00 on older FWs (bsc#1051510).\n- iwlwifi: mvm: fix error checking for multi/broadcast sta (bsc#1051510).\n- iwlwifi: mvm: fix race in queue notification wait (bsc#1051510).\n- iwlwifi: mvm: fix security bug in PN checking (bsc#1051510).\n- iwlwifi: mvm: honor the max_amsdu_subframes limit (bsc#1051510).\n- iwlwifi: mvm: make sure internal station has a valid id (bsc#1051510).\n- iwlwifi: mvm: remove DQA non-STA client mode special case (bsc#1051510).\n- iwlwifi: mvm: set the correct tid when we flush the MCAST sta (bsc#1051510).\n- iwlwifi: pcie: compare with number of IRQs requested for, not number of CPUs (bsc#1051510).\n- ixgbe: do not set RXDCTL.RLPML for 82599 (bsc#1056657).\n- ixgbe: prevent ptp_rx_hang from running when in FILTER_ALL mode (bsc#1056657 bsc#1056653).\n- jbd2: if the journal is aborted then do not allow update of the log tail (bsc#1052766).\n- jffs2_kill_sb(): deal with failed allocations (bsc#1052766).\n- kABI: protect ife_tlv_meta_decode (kabi).\n- kABI: protect struct cstate (kabi).\n- kABI: protect struct ipv6_pinfo (kabi).\n- kABI: protect tap_create_cdev (kabi).\n- kabi protect struct acpi_nfit_desc (bsc#1091424).\n- kabi/severities: Ignore kABI incompatibility for meson drm The symbols are used only between meson modules, so mostly internal.\n- kabi/severities: Ignore removed bugs.c symbols The second wave of SSBD patches drops those symbols and we can ignore them from kABI because nothing external should use them - they were exported only for kvm.\n- kabi/severities: add \u0027drivers/md/bcache/* PASS\u0027 for above change.\n- kabi/severities: add nvdimm internal symbols to kabi ignore list\n- kabi: add struct bpf_map back (References: bsc#1098425).\n- kcm: lock lower socket in kcm_attach (networking-stable-18_03_28).\n- kconfig: Avoid format overflow warning from GCC 8.1 (bsc#1051510).\n- kconfig: Do not leak main menus during parsing (bsc#1051510).\n- kconfig: Fix automatic menu creation mem leak (bsc#1051510).\n- kconfig: Fix expr_free() E_NOT leak (bsc#1051510).\n- kernel-binary: also default klp_symbols to 0 here.\n- kernel-binary: pass ARCH= to kernel build Recent kernel does not save CONFIG_64BIT so it has to be specified by arch.\n- kernel-binary: pass MAKE_ARGS to install script as well.\n- kernel-{binary,docs}.spec sort dependencies.\n- kernel/acct.c: fix the acct-\u003eneedcheck check in check_free_space() (Git-fixes).\n- kernel/async.c: revert \u0027async: simplify lowest_in_progress()\u0027 (Git-fixes).\n- kernel/relay.c: limit kmalloc size to KMALLOC_MAX_SIZE (bsc#1051510).\n- kernel/relay.c: revert \u0027kernel/relay.c: fix potential memory leak\u0027 (Git-fixes).\n- kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals (Git-fixes).\n- kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL (Git-fixes).\n- kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() (Git-fixes).\n- kexec: export PG_swapbacked to VMCOREINFO (bsc#1088354).\n- kexec_file: do not add extra alignment to efi memmap (bsc#1089268).\n- klp_symbols: make --klp-symbols argument semantic sane It selects build of klp symbols and defaults to off\n- kmod: fix wait on recursive loop (bsc#1099792).\n- kmod: reduce atomic operations on kmod_concurrent and simplify (bsc#1099792).\n- kmod: throttle kmod thread limit (bsc#1099792).\n- kobject: do not use WARN for registration failures (bsc#1051510).\n- kvm: Introduce nopvspin kernel parameter (bsc#1056427).\n- kvm: nVMX: Enforce cpl=0 for VMX instructions (bsc#1099183).\n- l2tp: check sockaddr length in pppol2tp_connect() (networking-stable-18_04_26).\n- l2tp: do not accept arbitrary sockets (bsc#1076830).\n- lan78xx: Crash in lan78xx_writ_reg (Workqueue: events lan78xx_deferred_multicast_write) (networking-stable-18_04_10).\n- leds: pm8058: Silence pointer to integer size warning (bsc#1051510).\n- lib/kobject: Join string literals back (bsc#1051510).\n- lib/string_helpers: Add missed declaration of struct task_struct (bsc#1099918).\n- lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly (bsc#1051510).\n- libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs (bsc#1051510).\n- libata: Blacklist some Sandisk SSDs for NCQ (bsc#1051510).\n- libata: Drop SanDisk SD7UB3Q*G1001 NOLPM quirk (bsc#1051510).\n- libata: blacklist Micron 500IT SSD with MU01 firmware (bsc#1051510).\n- libata: zpodd: make arrays cdb static, reduces object code size (bsc#1051510).\n- libata: zpodd: small read overflow in eject_tray() (bsc#1051510).\n- libceph, ceph: change permission for readonly debugfs entries (bsc#1089115).\n- libceph: adding missing message types to ceph_msg_type_name() (bsc#1089115).\n- libceph: fix misjudgement of maximum monitor number (bsc#1089115).\n- libceph: reschedule a tick in finish_hunting() (bsc#1089115).\n- libceph: un-backoff on tick when we have a authenticated session (bsc#1089115).\n- libceph: validate con-\u003estate at the top of try_write() (bsc#1089115).\n- libnvdimm, btt: add a couple of missing kernel-doc lines (bsc#1087210).\n- libnvdimm, btt: clean up warning and error messages (bsc#1087205).\n- libnvdimm, btt: fix format string warnings (bsc#1087205).\n- libnvdimm, dimm: handle EACCES failures from label reads ().\n- libnvdimm, label: change min label storage size per UEFI 2.7 (bsc#1091666).\n- libnvdimm, namespace: use a safe lookup for dimm device name (bsc#1095321).\n- libnvdimm, nfit: fix persistence domain reporting (bsc#1091424).\n- libnvdimm, pmem: Add sysfs notifications to badblocks ().\n- libnvdimm, pmem: Do not flush power-fail protected CPU caches (bsc#1091424).\n- libnvdimm, pmem: Unconditionally deep flush on *sync (bsc#1091424).\n- libnvdimm, region, pmem: fix \u0027badblocks\u0027 sysfs_get_dirent() reference lifetime ().\n- libnvdimm, region: hide persistence_domain when unknown (bsc#1091424).\n- libnvdimm: expose platform persistence attribute for nd_region (bsc#1091424).\n- libnvdimm: re-enable deep flush for pmem devices via fsync() (bsc#1091424).\n- llc: better deal with too small mtu (networking-stable-18_05_15).\n- llc: fix NULL pointer deref for SOCK_ZAPPED (networking-stable-18_04_26).\n- llc: hold llc_sap before release_sock() (networking-stable-18_04_26).\n- lock_parent() needs to recheck if dentry got __dentry_kill\u0027ed under it (bsc#1052766).\n- locking/atomics, dm-integrity: Convert ACCESS_ONCE() to READ_ONCE()/WRITE_ONCE() (bsc#1093023).\n- locking/atomics: COCCINELLE/treewide: Convert trivial ACCESS_ONCE() patterns to READ_ONCE()/WRITE_ONCE() (bsc#1093023).\n- locking/qspinlock: Ensure node is initialised before updating prev-\u003enext (bsc#1050549).\n- locking/qspinlock: Ensure node-\u003ecount is updated before initialising node (bsc#1050549).\n- locking: Remove smp_read_barrier_depends() from queued_spin_lock_slowpath() (bsc#1050549).\n- loop: handle short DIO reads (bsc#1052766).\n- lsm: fix smack_inode_removexattr and xattr_getsecurity memleak (bsc#1051510).\n- mac80211: Adjust SAE authentication timeout (bsc#1051510).\n- mac80211: Do not disconnect on invalid operating class (bsc#1051510).\n- mac80211: Fix condition validating WMM IE (bsc#1051510).\n- mac80211: Fix sending ADDBA response for an ongoing session (bsc#1051510).\n- mac80211: Fix setting TX power on monitor interfaces (bsc#1051510).\n- mac80211: drop frames with unexpected DS bits from fast-rx to slow path (bsc#1051510).\n- mac80211: mesh: fix wrong mesh TTL offset calculation (bsc#1051510).\n- mac80211: round IEEE80211_TX_STATUS_HEADROOM up to multiple of 4 (bsc#1051510).\n- mac80211: use timeout from the AddBA response instead of the request (bsc#1051510).\n- macros.kernel-source: Fix building non-x86 KMPs\n- macros.kernel-source: define linux_arch for KMPs (boo#1098050). CONFIG_64BIT is no longer defined so KMP spec files need to include %{?linux_make_arch} in any make call to build modules or descent into the kernel directory for any reason.\n- macros.kernel-source: ignore errors when using make to print kernel release There is no way to handle the errors anyway and including the error into package version does not give good results.\n- macvlan: filter out unsupported feature flags (networking-stable-18_03_28).\n- macvlan: fix memory hole in macvlan_dev (bsc#1099918).\n- macvlan: remove unused fields in struct macvlan_dev (bsc#1099918).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush sequence (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix mask used in CMPL_START_ADDR_VALUE() (bsc#1051510).\n- mailbox: mailbox-test: do not rely on rx_buffer content to signal data ready (bsc#1051510).\n- mbcache: initialize entry-\u003ee_referenced in mb_cache_entry_create() (bsc#1052766).\n- md-cluster: choose correct label when clustered layout is not supported (bsc#1093023).\n- md-cluster: do not update recovery_offset for faulty device (bsc#1093023).\n- md-cluster: make function cluster_check_sync_size static (bsc#1093023).\n- md-multipath: Use seq_putc() in multipath_status() (bsc#1093023).\n- md/bitmap: clear BITMAP_WRITE_ERROR bit before writing it to sb (bsc#1093023).\n- md/bitmap: copy correct data for bitmap super (bsc#1093023).\n- md/bitmap: revert a patch (bsc#1093023).\n- md/r5cache: call mddev_lock/unlock() in r5c_journal_mode_show (bsc#1093023).\n- md/r5cache: fix io_unit handling in r5l_log_endio() (bsc#1093023).\n- md/r5cache: move mddev_lock() out of r5c_journal_mode_set() (bsc#1093023).\n- md/r5cache: print more info of log recovery (bsc#1093023).\n- md/raid0: attach correct cgroup info in bio (bsc#1093023).\n- md/raid1,raid10: silence warning about wait-within-wait (bsc#1093023).\n- md/raid1/10: add missed blk plug (bsc#1093023).\n- md/raid1: Fix trailing semicolon (bsc#1093023).\n- md/raid1: exit sync request if MD_RECOVERY_INTR is set (bsc#1093023).\n- md/raid1: fix NULL pointer dereference (bsc#1093023).\n- md/raid5: cap worker count (bsc#1093023).\n- md/raid5: correct degraded calculation in raid5_error (bsc#1093023).\n- md/raid5: simplify uninitialization of shrinker (bsc#1093023).\n- md: Delete gendisk before cleaning up the request queue (bsc#1093023).\n- md: allow metadata update while suspending (bsc#1093023).\n- md: always hold reconfig_mutex when calling mddev_suspend() (bsc#1093023).\n- md: be cautious about using -\u003ecurr_resync_completed for -\u003erecovery_offset (bsc#1093023).\n- md: do not call bitmap_create() while array is quiesced (bsc#1093023).\n- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (bsc#1093023).\n- md: document lifetime of internal rdev pointer (bsc#1093023).\n- md: fix a potential deadlock of raid5/raid10 reshape (bsc#1093023).\n- md: fix a race condition for flush request handling (bsc#1093023).\n- md: fix deadlock error in recent patch (bsc#1093023).\n- md: fix two problems with setting the \u0027re-add\u0027 device state (bsc#1098176).\n- md: forbid a RAID5 from having both a bitmap and a journal (bsc#1093023).\n- md: free unused memory after bitmap resize (bsc#1093023).\n- md: limit mdstat resync progress to max_sectors (bsc#1093023).\n- md: move suspend_hi/lo handling into core md code (bsc#1093023).\n- md: only allow remove_and_add_spares when no sync_thread running (bsc#1093023).\n- md: raid10: remove VLAIS (bsc#1093023).\n- md: raid10: remove a couple of redundant variables and initializations (bsc#1093023).\n- md: raid5: avoid string overflow warning (bsc#1093023).\n- md: release allocated bitset sync_set (bsc#1093023).\n- md: remove redundant variable q (bsc#1093023).\n- md: remove special meaning of -\u003equiesce(.., 2) (bsc#1093023).\n- md: rename some drivers/md/ files to have an \u0027md-\u0027 prefix (bsc#1093023).\n- md: replace seq_release_private with seq_release (bsc#1093023).\n- md: separate request handling (bsc#1093023).\n- md: use TASK_IDLE instead of blocking signals (bsc#1093023).\n- md: use lockdep_assert_held (bsc#1093023).\n- md: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1093023).\n- media: atomisp_fops.c: disable atomisp_compat_ioctl32 (bsc#1051510).\n- media: au0828: add VIDEO_V4L2 dependency (bsc#1051510).\n- media: cx231xx: Add support for AverMedia DVD EZMaker 7 (bsc#1051510).\n- media: cx23885: Override 888 ImpactVCBe crystal frequency (bsc#1051510).\n- media: cx23885: Set subdev host data to clk_freq pointer (bsc#1051510).\n- media: dmxdev: fix error code for invalid ioctls (bsc#1051510).\n- media: dvb_frontend: fix locking issues at dvb_frontend_get_event() (bsc#1051510).\n- media: em28xx: Add Hauppauge SoloHD/DualHD bulk models (bsc#1051510).\n- media: em28xx: USB bulk packet size fix (bsc#1051510).\n- media: lgdt3306a: Fix a double kfree on i2c device remove (bsc#1051510).\n- media: lgdt3306a: Fix module count mismatch on usb unplug (bsc#1051510).\n- media: smiapp: fix timeout checking in smiapp_read_nvm (bsc#1099918).\n- media: uvcvideo: Support realtek\u0027s UVC 1.5 device (bsc#1099109).\n- media: v4l2-compat-ioctl32: do not oops on overlay (bsc#1051510).\n- media: v4l2-compat-ioctl32: prevent go past max size (bsc#1051510).\n- media: videobuf2-core: do not go out of the buffer range (bsc#1051510).\n- media: vivid: check if the cec_adapter is valid (bsc#1051510).\n- mei: me: add cannon point device ids ().\n- mei: me: add cannon point device ids for 4th device ().\n- mei: remove dev_err message on an unsupported ioctl (bsc#1051510).\n- mfd: cros ec: spi: Do not send first message too soon (bsc#1051510).\n- mfd: intel-lpss: Fix Intel Cannon Lake LPSS I2C input clock (bsc#1051510).\n- mfd: intel-lpss: Program REMAP register in PIO mode (bsc#1051510).\n- mkspec: only build docs for default variant kernel.\n- mlxsw: spectrum: Disable MAC learning for ovs port (networking-stable-17_12_31).\n- mlxsw: spectrum: Forbid linking to devices that have uppers FIX (stable-fixes).\n- mlxsw: spectrum: Prevent mirred-related crash on removal (networking-stable-17_10_09).\n- mlxsw: spectrum: Relax sanity checks during enslavement (networking-stable-18_01_12).\n- mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic (networking-stable-18_03_28).\n- mlxsw: spectrum_router: Do not log an error on missing neighbor (networking-stable-18_01_28).\n- mlxsw: spectrum_router: Fix NULL pointer deref (networking-stable-18_01_12).\n- mlxsw: spectrum_router: Fix error path in mlxsw_sp_vr_create (networking-stable-18_03_07).\n- mlxsw: spectrum_router: Simplify a piece of code (networking-stable-18_01_12).\n- mlxsw: spectrum_switchdev: Check success of FDB add operation (networking-stable-18_03_07).\n- mm, oom_reaper: skip mm structs with mmu notifiers (bsc#1099918).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- mm, percpu: add support for __GFP_NOWARN flag (bsc#1089753).\n- mm, slab: reschedule cache_reap() on the same CPU (VM Functionality, bsc#1097796).\n- mm, swap: fix false error message in __swp_swapcount() (VM Functionality, bsc#1098043).\n- mm, swap: fix race between swap count continuation operations (VM Functionality, bsc#1097373). mm, swap: fix race between swap count continuation operations - KABI fix (VM Functionality, bsc#1097373).\n- mm, thp: do not cause memcg oom for thp (bnc#1089663).\n- mm/fadvise: discard partial page if endbyte is also EOF (bsc#1052766).\n- mm/filemap.c: fix NULL pointer in page_cache_tree_insert() (bsc#1052766).\n- mm/huge_memory.c: __split_huge_page() use atomic ClearPageDirty() (VM Functionality, bsc#1097800).\n- mm/khugepaged.c: convert VM_BUG_ON() to collapse fail (VM Functionality, bsc#1097468).\n- mm/ksm.c: fix inconsistent accounting of zero pages (VM Functionality, bsc#1097780).\n- mm/mempolicy.c: avoid use uninitialized preferred_node (VM Functionality, bsc#1097465).\n- mm/page_owner: fix recursion bug after changing skip entries (VM Functionality, bsc#1097472).\n- mm/pkeys, powerpc, x86: Provide an empty vma_pkey() in linux/pkeys.h (bsc#1078248).\n- mm/pkeys, x86, powerpc: Display pkey in smaps if arch supports pkeys (bsc#1078248).\n- mm/pkeys: Add an empty arch_pkeys_enabled() (bsc#1078248).\n- mm/pkeys: Remove include of asm/mmu_context.h from pkeys.h (bsc#1078248).\n- mm/shmem: do not wait for lock_page() in shmem_unused_huge_shrink() (bnc#1089667).\n- mm/thp: do not wait for lock_page() in deferred_split_scan() (VM Functionality, bsc#1097470).\n- mm: Fix memory size alignment in devm_memremap_pages_release() (VM Functionality, bsc#1097439).\n- mm: fix device-dax pud write-faults triggered by get_user_pages() (bsc#1052766).\n- mm: fix the NULL mapping case in __isolate_lru_page() (bnc#971975 VM -- git fixes).\n- mmc: dw_mmc: exynos: fix the suspend/resume issue for exynos5433 (bsc#1051510).\n- mmc: jz4740: Fix race condition in IRQ mask update (bsc#1051510).\n- mmc: sdhci-iproc: add SDHCI_QUIRK2_HOST_OFF_CARD_ON for cygnus (bsc#1051510).\n- mmc: sdhci-iproc: fix 32bit writes for TRANSFER_MODE register (bsc#1051510).\n- mmc: sdhci-iproc: remove hard coded mmc cap 1.8v (bsc#1051510).\n- mmc: sdhci-pci: Fix voltage switch for some Intel host controllers (bsc#1051510).\n- mmc: sdhci-pci: Only do AMD tuning for HS200 (bsc#1051510).\n- mq-deadline: Enable auto-loading when built as module (bsc#1099918).\n- mremap: Remove LATENCY_LIMIT from mremap to reduce the number of TLB shootdowns (bnc#1095115).\n- mtd: cmdlinepart: Update comment for introduction of OFFSET_CONTINUOUS (bsc#1099918).\n- mtd: jedec_probe: Fix crash in jedec_read_mfr() (bsc#1099918).\n- mtd: nand: fsl_ifc: Fix eccstat array overflow for IFC ver \u003e= 2.0.0 (bsc#1099918).\n- mtd: partitions: add helper for deleting partition (bsc#1099918).\n- mtd: partitions: remove sysfs files when deleting all master\u0027s partitions (bsc#1099918).\n- mtd: ubi: wl: Fix error return code in ubi_wl_init() (bsc#1051510).\n- mwifiex: pcie: tighten a check in mwifiex_pcie_process_event_ready() (bsc#1051510).\n- n_tty: Access echo_* variables carefully (bsc#1051510).\n- n_tty: Fix stall at n_tty_receive_char_special() (bsc#1051510).\n- n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) (bnc#1094825).\n- nbd: do not start req until after the dead connection logic (bsc#1099918).\n- nbd: fix -ERESTARTSYS handling (bsc#1099918).\n- nbd: fix nbd device deletion (bsc#1099918).\n- nbd: fix return value in error handling path (bsc#1099918).\n- nbd: wait uninterruptible for the dead timeout (bsc#1099918).\n- net sched actions: fix refcnt leak in skbmod (networking-stable-18_05_15).\n- net sched actions: return explicit error when tunnel_key mode is not specified (bsc#1056787).\n- net/ipv6: Fix route leaking between VRFs (networking-stable-18_04_10).\n- net/ipv6: Increment OUTxxx counters after netfilter hook (networking-stable-18_04_10).\n- net/iucv: Free memory obtained by kzalloc (networking-stable-18_03_28).\n- net/mlx4_en: Fix an error handling path in \u0027mlx4_en_init_netdev()\u0027 (networking-stable-18_05_15).\n- net/mlx4_en: Verify coalescing parameters are in range (networking-stable-18_05_15).\n- net/mlx5: E-Switch, Include VF RDMA stats in vport statistics (networking-stable-18_05_15).\n- net/mlx5: Eliminate query xsrq dead code (bsc#1046303).\n- net/mlx5: Fix build break when CONFIG_SMP=n (bsc#1046303).\n- net/mlx5: Fix mlx5_get_vector_affinity function (bsc#1046303).\n- net/mlx5e: Allow offloading ipv4 header re-write for icmp (bsc#1046303).\n- net/mlx5e: Do not reset Receive Queue params on every type change (bsc#1046303).\n- net/mlx5e: Err if asked to offload TC match on frag being first (networking-stable-18_05_15).\n- net/mlx5e: Fixed sleeping inside atomic context (bsc#1046303).\n- net/mlx5e: Remove unused define MLX5_MPWRQ_STRIDES_PER_PAGE (bsc#1046303).\n- net/mlx5e: TX, Use correct counter in dma_map error flow (networking-stable-18_05_15).\n- net/sched: cls_u32: fix cls_u32 on filter replace (networking-stable-18_03_07).\n- net/sched: fix NULL dereference in the error path of tcf_bpf_init() (bsc#1056787).\n- net/sched: fix NULL dereference in the error path of tunnel_key_init() (bsc#1056787).\n- net/sched: fix NULL dereference on the error path of tcf_skbmod_init() (bsc#1056787).\n- net/sctp: Always set scope_id in sctp_inet6_skb_msgname (networking-stable-17_11_20).\n- net/unix: do not show information about sockets from other namespaces (networking-stable-17_11_14).\n- net/usb/qmi_wwan.c: Add USB id for lt4120 modem (bsc#1087092).\n- net: Allow neigh contructor functions ability to modify the primary_key (networking-stable-18_01_28).\n- net: Fix hlist corruptions in inet_evict_bucket() (networking-stable-18_03_28).\n- net: Only honor ifindex in IP_PKTINFO if non-0 (networking-stable-18_03_28).\n- net: Set sk_prot_creator when cloning sockets to the right proto (networking-stable-17_10_09).\n- net: af_packet: fix race in PACKET_{R|T}X_RING (networking-stable-18_04_26).\n- net: bonding: Fix transmit load balancing in balance-alb mode if specified by sysfs (networking-stable-17_10_09).\n- net: bonding: fix tlb_dynamic_lb default value (networking-stable-17_10_09).\n- net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks (networking-stable-17_12_31).\n- net: bridge: fix returning of vlan range op errors (networking-stable-17_11_14).\n- net: core: fix module type in sock_diag_bind (networking-stable-18_01_12).\n- net: dsa: bcm_sf2: Clear IDDQ_GLOBAL_PWR bit for PHY (networking-stable-17_12_31).\n- net: dsa: check master device before put (networking-stable-17_11_14).\n- net: dsa: mv88e6xxx: lock mutex when freeing IRQs (networking-stable-17_10_09).\n- net: emac: Fix napi poll list corruption (networking-stable-17_10_09).\n- net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred (networking-stable-18_03_28).\n- net: ethernet: sun: niu set correct packet size in skb (networking-stable-18_05_15).\n- net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY interface (networking-stable-18_03_28).\n- net: ethernet: ti: cpsw: fix net watchdog timeout (networking-stable-18_03_07).\n- net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode (networking-stable-18_05_15).\n- net: ethernet: ti: cpsw: fix tx vlan priority mapping (networking-stable-18_04_26).\n- net: ethtool: Add missing kernel doc for FEC parameters (bsc#1046540).\n- net: fec: Fix unbalanced PM runtime calls (networking-stable-18_03_28).\n- net: fec: defer probe if regulator is not ready (networking-stable-18_01_12).\n- net: fec: free/restore resource in related probe error pathes (networking-stable-18_01_12).\n- net: fec: restore dev_id in the cases of probe error (networking-stable-18_01_12).\n- net: fec: unmap the xmit buffer that are not transferred by DMA (networking-stable-17_12_31).\n- net: fix deadlock while clearing neighbor proxy table (networking-stable-18_04_26).\n- net: fix possible out-of-bound read in skb_network_protocol() (networking-stable-18_04_10).\n- net: fool proof dev_valid_name() (networking-stable-18_04_10).\n- net: igmp: Use correct source address on IGMPv3 reports (networking-stable-17_12_31).\n- net: igmp: add a missing rcu locking section (git-fixes).\n- net: igmp: fix source address check for IGMPv3 reports (git-fixes).\n- net: ipv4: avoid unused variable warning for sysctl (git-fixes).\n- net: ipv4: do not allow setting net.ipv4.route.min_pmtu below 68 (networking-stable-18_03_07).\n- net: ipv6: keep sk status consistent after datagram connect failure (networking-stable-18_03_28).\n- net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case (networking-stable-17_12_31).\n- net: phy: Fix mask value write on gmii2rgmii converter speed register (networking-stable-17_10_09).\n- net: phy: Tell caller result of phy_change() (networking-stable-18_03_28).\n- net: phy: fix phy_start to consider PHY_IGNORE_INTERRUPT (networking-stable-18_03_07).\n- net: phy: marvell: Limit 88m1101 autoneg errata to 88E1145 as well (networking-stable-17_12_31).\n- net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround (networking-stable-17_12_31).\n- net: qcom/emac: specify the correct size when mapping a DMA buffer (networking-stable-17_10_09).\n- net: qdisc_pkt_len_init() should be more robust (networking-stable-18_01_28).\n- net: qlge: use memmove instead of skb_copy_to_linear_data (bsc#1050529 bsc#1086319).\n- net: realtek: r8169: implement set_link_ksettings() (networking-stable-17_12_12).\n- net: reevalulate autoflowlabel setting after sysctl setting (networking-stable-17_12_31).\n- net: remove hlist_nulls_add_tail_rcu() (networking-stable-17_12_12).\n- net: sched: fix error path in tcf_proto_create() when modules are not configured (networking-stable-18_05_15).\n- net: sched: ife: check on metadata length (networking-stable-18_04_26).\n- net: sched: ife: handle malformed tlv length (networking-stable-18_04_26).\n- net: sched: ife: signal not finding metaid (networking-stable-18_04_26).\n- net: sched: report if filter is too large to dump (networking-stable-18_03_07).\n- net: stmmac: enable EEE in MII, GMII or RGMII only (networking-stable-18_01_12).\n- net: support compat 64-bit time in {s,g}etsockopt (networking-stable-18_05_15).\n- net: systemport: Correct IPG length settings (networking-stable-17_11_20).\n- net: systemport: Rewrite __bcm_sysport_tx_reclaim() (networking-stable-18_03_28).\n- net: tcp: close sock if net namespace is exiting (networking-stable-18_01_28).\n- net: validate attribute sizes in neigh_dump_table() (networking-stable-18_04_26).\n- net: vrf: Add support for sends to local broadcast address (networking-stable-18_01_28).\n- net_sched: fq: take care of throttled flows before reuse (networking-stable-18_05_15).\n- netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed (networking-stable-17_11_20).\n- netfilter: use skb_to_full_sk in ip6_route_me_harder (bsc#1076830).\n- netlink: avoid a double skb free in genlmsg_mcast() (git-fixes).\n- netlink: do not proceed if dump\u0027s start() errs (networking-stable-17_10_09).\n- netlink: do not set cb_running if dump\u0027s start() errs (networking-stable-17_11_14).\n- netlink: ensure to loop over all netns in genlmsg_multicast_allns() (networking-stable-18_03_07).\n- netlink: extack needs to be reset each time through loop (networking-stable-18_01_28).\n- netlink: make sure nladdr has correct size in netlink_connect() (networking-stable-18_04_10).\n- netlink: put module reference if dump start fails (git-fixes).\n- netlink: reset extack earlier in netlink_rcv_skb (networking-stable-18_01_28).\n- nfit-test: Add platform cap support from ACPI 6.2a to test (bsc#1091424).\n- nfit: skip region registration for incomplete control regions (bsc#1091666).\n- nfp: use full 40 bits of the NSP buffer address (bsc#1055968).\n- nl80211: relax ht operation checks for mesh (bsc#1051510).\n- nubus: Avoid array underflow and overflow (bsc#1099918).\n- nubus: Fix up header split (bsc#1099918).\n- nvme-fabrics: allow duplicate connections to the discovery controller (bsc#1098706).\n- nvme-fabrics: allow internal passthrough command on deleting controllers (bsc#1098706).\n- nvme-fabrics: centralize discovery controller defaults (bsc#1098706).\n- nvme-fabrics: fix and refine state checks in __nvmf_check_ready (bsc#1098706).\n- nvme-fabrics: handle the admin-only case properly in nvmf_check_ready (bsc#1098706).\n- nvme-fabrics: refactor queue ready check (bsc#1098706).\n- nvme-fabrics: remove unnecessary controller subnqn validation (bsc#1098706).\n- nvme-fc: change controllers first connect to use reconnect path (bsc#1098706).\n- nvme-fc: fix nulling of queue data on reconnect (bsc#1098706).\n- nvme-fc: release io queues to allow fast fail (bsc#1098706).\n- nvme-fc: remove reinit_request routine (bsc#1098706).\n- nvme-fc: remove setting DNR on exception conditions (bsc#1098706).\n- nvme-multipath: fix sysfs dangerously created links (bsc#1096529).\n- nvme-rdma: Fix command completion race at error recovery (bsc#1099041).\n- nvme-rdma: correctly check for target keyed sgl support (bsc#1099041).\n- nvme-rdma: do not override opts-\u003equeue_size (bsc#1099041).\n- nvme-rdma: fix error flow during mapping request data (bsc#1099041).\n- nvme-rdma: fix possible double free condition when failing to create a controller (bsc#1099041).\n- nvme/multipath: Fix multipath disabled naming collisions (bsc#1098706).\n- nvme: Set integrity flag for user passthrough commands (bsc#1098706).\n- nvme: Skip checking heads without namespaces (bsc#1098706).\n- nvme: Use admin command effects for admin commands (bsc#1098706).\n- nvme: add quirk to force medium priority for SQ creation ().\n- nvme: allow duplicate controller if prior controller being deleted (bsc#1098706).\n- nvme: check return value of init_srcu_struct function (bsc#1098706).\n- nvme: do not send keep-alives to the discovery controller ().\n- nvme: expand nvmf_check_if_ready checks (bsc#1098706).\n- nvme: fix NULL pointer dereference in nvme_init_subsystem (bsc#1098706).\n- nvme: fix extended data LBA supported setting ().\n- nvme: fix lockdep warning in nvme_mpath_clear_current_path ().\n- nvme: fix potential memory leak in option parsing (bsc#1098706).\n- nvme: move init of keep_alive work item to controller initialization (bsc#1098706).\n- nvme: target: fix buffer overflow ().\n- nvmet-fc: increase LS buffer count per fc port (bsc#1098706).\n- nvmet: fix space padding in serial number ().\n- nvmet: switch loopback target state to connecting when resetting (bsc#1098706).\n- objtool, perf: Fix GCC 8 -Wrestrict error (Fix gcc 8 restrict error).\n- ocfs2/acl: use \u0027ip_xattr_sem\u0027 to protect getting extended attribute (bsc#1052766).\n- ocfs2/dlm: Fix up kABI in dlm_ctxt (bsc#1052766).\n- ocfs2/dlm: wait for dlm recovery done when migrating all lock resources (bsc#1052766).\n- ocfs2: return -EROFS to mount.ocfs2 if inode block is invalid (bsc#1052766).\n- of: overlay: validate offset from property fixups (bsc#1051510).\n- of: platform: stop accessing invalid dev in of_platform_device_destroy (bsc#1051510).\n- of: unittest: for strings, account for trailing \\0 in property length field (bsc#1051510).\n- omapdrm: panel: fix compatible vendor string for td028ttec1 (bsc#1051510).\n- openvswitch: Do not swap table in nlattr_set() after OVS_ATTR_NESTED is found (networking-stable-18_05_15).\n- ovl: Put upperdentry if ovl_check_origin() fails (bsc#1088704).\n- ovl: Return -ENOMEM if an allocation fails ovl_lookup() (bsc#1096065).\n- ovl: fix failure to fsync lower dir (bsc#108871).\n- ovl: fix lookup with middle layer opaque dir and absolute path redirects (bsc#1090605).\n- p54: do not unregister leds when they are not initialized (bsc#1051510).\n- parport_pc: Add support for WCH CH382L PCI-E single parallel port card (bsc#1051510).\n- partitions/msdos: Unable to mount UFS 44bsd partitions (bsc#1051510).\n- pinctrl/amd: Fix build dependency on pinmux code (bsc#1051510).\n- pinctrl/amd: save pin registers over suspend/resume (bsc#1051510).\n- pinctrl: adi2: Fix Kconfig build problem (bsc#1051510).\n- pinctrl: armada-37xx: Fix direction_output() callback behavior (bsc#1051510).\n- pinctrl: artpec6: dt: add missing pin group uart5nocts (bsc#1051510).\n- pinctrl: baytrail: Enable glitch filter for GPIOs used as interrupts (bsc#1051510).\n- pinctrl: denverton: Fix UART2 RTS pin mode (bsc#1051510).\n- pinctrl: pxa: pxa2xx: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- pinctrl: rockchip: enable clock when reading pin direction register (bsc#1051510).\n- pinctrl: samsung: Fix NULL pointer exception on external interrupts on S3C24xx (bsc#1051510).\n- pinctrl: samsung: Fix invalid register offset used for Exynos5433 external interrupts (bsc#1051510).\n- pinctrl: sh-pfc: r8a7795-es1: Fix MOD_SEL1 bit[25:24] to 0x3 when using STP_ISEN_1_D (bsc#1051510).\n- pinctrl: sh-pfc: r8a7796: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510).\n- pinctrl: sunxi: Fix A64 UART mux value (bsc#1051510).\n- pinctrl: sunxi: Fix A80 interrupt pin bank (bsc#1051510).\n- pinctrl: sx150x: Add a static gpio/pinctrl pin range mapping (bsc#1051510).\n- pinctrl: sx150x: Register pinctrl before adding the gpiochip (bsc#1051510).\n- pinctrl: sx150x: Unregister the pinctrl on release (bsc#1051510).\n- pipe: fix off-by-one error when checking buffer limits (bsc#1051510).\n- pktcdvd: Fix a recently introduced NULL pointer dereference (bsc#1099918).\n- pktcdvd: Fix pkt_setup_dev() error path (bsc#1099918).\n- platform/chrome: Use proper protocol transfer function (bsc#1051510).\n- platform/chrome: cros_ec_lpc: remove redundant pointer request (bsc#1051510).\n- platform/x86: asus-wireless: Fix NULL pointer dereference (bsc#1051510).\n- platform/x86: asus-wmi: Fix NULL pointer dereference (bsc#1051510).\n- platform/x86: fujitsu-laptop: Support Lifebook U7x7 hotkeys (bsc#1087284).\n- platform/x86: ideapad-laptop: Add MIIX 720-12IKB to no_hw_rfkill (bsc#1093035).\n- platform/x86: ideapad-laptop: Apply no_hw_rfkill to Y20-15IKBM, too (bsc#1098626).\n- platform/x86: thinkpad_acpi: suppress warning about palm detection (bsc#1051510).\n- power: supply: ab8500_charger: Bail out in case of error in \u0027ab8500_charger_init_hw_registers()\u0027 (bsc#1051510).\n- power: supply: ab8500_charger: Fix an error handling path (bsc#1051510).\n- power: supply: axp288_charger: Properly stop work on probe-error / remove (bsc#1051510).\n- powerpc/64s/idle: avoid sync for KVM state when waking from idle (bsc#1061840).\n- powerpc/64s: Fix mce accounting for powernv (bsc#1094244).\n- powerpc/fadump: Do not use hugepages when fadump is active (bsc#1092772).\n- powerpc/fadump: exclude memory holes while reserving memory in second kernel (bsc#1092772).\n- powerpc/kvm: Fix guest boot failure on Power9 since DAWR changes (bsc#1061840).\n- powerpc/kvm: Fix lockups when running KVM guests on Power8 (bsc#1061840).\n- powerpc/livepatch: Fix KABI breaker in stacktrace.c (bsc#1071995 bsc#1072856 bsc#1087458 bsc#1089664 bsc#1089669).\n- powerpc/livepatch: Fix build error with kprobes disabled (bsc#1071995).\n- powerpc/mm: Fix thread_pkey_regs_init() (bsc#1078248, git-fixes).\n- powerpc/perf: Add blacklisted events for Power9 DD2.1 (bsc1056686).\n- powerpc/perf: Add blacklisted events for Power9 DD2.2 (bsc1056686).\n- powerpc/perf: Fix kernel address leak via sampling registers (bsc1056686).\n- powerpc/perf: Infrastructure to support addition of blacklisted events (bsc1056686).\n- powerpc/perf: Prevent kernel address leak to userspace via BHRB buffer (bsc1056686).\n- powerpc/perf: Prevent kernel address leak via perf_get_data_addr() (bsc1056686).\n- powerpc/perf: fix bug references.\n- powerpc/pkeys: Detach execute_only key on !PROT_EXEC (bsc#1078248, git-fixes).\n- powerpc/pkeys: Drop private VM_PKEY definitions (bsc#1078248).\n- powerpc/ptrace: Fix enforcement of DAWR constraints (bsc#1099918).\n- powerpc/xmon: Also setup debugger hooks when single-stepping (bsc#1072829).\n- powerpc64/ftrace: Add a field in paca to disable ftrace in unsafe code paths (bsc#1088804).\n- powerpc64/ftrace: Add helpers to hard disable ftrace (bsc#1088804).\n- powerpc64/ftrace: Delay enabling ftrace on secondary cpus (bsc#1088804).\n- powerpc64/ftrace: Disable ftrace during hotplug (bsc#1088804).\n- powerpc64/ftrace: Disable ftrace during kvm guest entry/exit (bsc#1088804).\n- powerpc64/ftrace: Rearrange #ifdef sections in ftrace.h (bsc#1088804).\n- powerpc64/ftrace: Use the generic version of ftrace_replace_code() (bsc#1088804).\n- powerpc64/kexec: Hard disable ftrace before switching to the new kernel (bsc#1088804).\n- powerpc64/module: Tighten detection of mcount call sites with -mprofile-kernel (bsc#1088804).\n- powerpc: Machine check interrupt is a non-maskable interrupt (bsc#1094244).\n- ppp: avoid loop in xmit recursion detection code (networking-stable-18_03_28).\n- ppp: fix race in ppp device destruction (networking-stable-17_11_14).\n- ppp: prevent unregistered channels from connecting to PPP units (networking-stable-18_03_07).\n- ppp: unlock all_ppp_mutex before registering device (networking-stable-18_01_28).\n- pppoe: check sockaddr length in pppoe_connect() (networking-stable-18_04_26).\n- pppoe: take -\u003eneeded_headroom of lower device into account on xmit (networking-stable-18_01_28).\n- pptp: remove a buggy dst release in pptp_connect() (networking-stable-18_04_10).\n- printk: fix possible reuse of va_list variable (bsc#1100602).\n- procfs: add tunable for fd/fdinfo dentry retention (bsc#1086652).\n- ptr_ring: add barriers (networking-stable-17_12_31).\n- pty: cancel pty slave port buf\u0027s work in tty_release (bsc#1051510).\n- pwm: lpss: platform: Save/restore the ctrl register over a suspend/resume (bsc#1051510).\n- pwm: rcar: Fix a condition to prevent mismatch value setting to duty (bsc#1051510).\n- pwm: stmpe: Fix wrong register offset for hwpwm=2 case (bsc#1051510).\n- qed: Fix l2 initializations over iWARP personality (bsc#1050536 bsc#1050545).\n- qed: Fix non TCP packets should be dropped on iWARP ll2 connection (bsc#1050545).\n- qed: Free RoCE ILT Memory on rmmod qedr (bsc#1050536 bsc#1050545).\n- qed: Use after free in qed_rdma_free() (bsc#1050536 bsc#1050545).\n- qede: Fix gfp flags sent to rdma event node allocation (bsc#1050538 bsc#1050545).\n- qede: Fix qedr link update (bsc#1050538 bsc#1050545).\n- qla2xxx: Mask off Scope bits in retry delay (bsc#1068054).\n- qmi_wwan: Add missing skb_reset_mac_header-call (networking-stable-17_11_20).\n- qmi_wwan: Add support for Quectel EP06 (networking-stable-18_02_06).\n- qmi_wwan: do not steal interfaces from class drivers (bsc#1092888).\n- r8169: fix powering up RTL8168h (bsc#1051510).\n- r8169: fix setting driver_data after register_netdev (bsc#1051510).\n- radeon: hide pointless #warning when compile testing (bsc#1051510).\n- radix tree test suite: add item_delete_rcu() (bsc#1095467).\n- radix tree test suite: fix compilation issue (bsc#1095467).\n- radix tree test suite: fix mapshift build target (bsc#1095467).\n- radix tree test suite: multi-order iteration race (bsc#1095467).\n- radix tree: fix multi-order iteration race (bsc#1095467).\n- raid10: check bio in r10buf_pool_free to void NULL pointer dereference (bsc#1098174).\n- raid1: copy write hint from master bio to behind bio (bsc#1093023).\n- raid1: prevent freeze_array/wait_all_barriers deadlock (bsc#1093023).\n- raid1: remove obsolete code in raid1_write_request (bsc#1093023).\n- raid5-ppl: PPL support for disks with write-back cache enabled (bsc#1093023).\n- raid5-ppl: fix handling flush requests (bsc#1093023).\n- raid5: Set R5_Expanded on parity devices as well as data (bsc#1093023).\n- raid5: remove raid5_build_block (bsc#1093023).\n- raid: remove tile specific raid6 implementation (bsc#1093023).\n- random: crng_reseed() should lock the crng instance that it is modifying (bsc#1051510).\n- random: use a different mixing algorithm for add_device_randomness() (bsc#1051510).\n- random: use a tighter cap in credit_entropy_bits_safe() (bsc#1051510).\n- rbd: use GFP_NOIO for parent stat and data requests (bsc#1093728).\n- rds: Incorrect reference counting in TCP socket creation (bsc#1076830).\n- rds: MP-RDS may use an invalid c_path (networking-stable-18_04_13).\n- rds: do not leak kernel memory to user land (networking-stable-18_05_15).\n- regulator: Do not return or expect -errno from of_map_mode() (bsc#1099029).\n- regulator: cpcap: Fix standby mode (bsc#1051510).\n- regulator: gpio: Fix some error handling paths in \u0027gpio_regulator_probe()\u0027 (bsc#1091960).\n- regulator: of: Add a missing \u0027of_node_put()\u0027 in an error handling path of \u0027of_regulator_match()\u0027 (bsc#1051510).\n- resource: fix integer overflow at reallocation (bsc#1086739).\n- restore cond_resched() in shrink_dcache_parent() (bsc#1098599).\n- rfkill: gpio: fix memory leak in probe error path (bsc#1051510).\n- rhashtable: Fix rhlist duplicates insertion (bsc#1051510).\n- rmdir(),rename(): do shrink_dcache_parent() only on success (bsc#1100340).\n- rocker: fix possible null pointer dereference in rocker_router_fib_event_work (networking-stable-18_02_06).\n- route: check sysctl_fib_multipath_use_neigh earlier than hash (networking-stable-18_04_10).\n- rpm/config.sh: Fixup BUGZILLA_PRODUCT variable\n- rpm/kernel-docs.spec.in: Fix and cleanup for 4.13 doc build (bsc#1048129) The whole DocBook stuff has been deleted. The PDF build still non-working thus the sub-packaging disabled so far.\n- rpm/kernel-source.changes.old: Add pre-SLE15 history (bsc#1098995).\n- rpm/modules.fips include module list from dracut\n- rt2x00: do not pause queue unconditionally on error path (bsc#1051510).\n- rtc-opal: Fix handling of firmware error codes, prevent busy loops (bsc#1051510).\n- rtc: hctosys: Ensure system time does not overflow time_t (bsc#1051510).\n- rtc: pcf8563: fix output clock rate (bsc#1051510).\n- rtc: pl031: make interrupt optional (bsc#1051510).\n- rtc: snvs: Fix usage of snvs_rtc_enable (bsc#1051510).\n- rtc: tx4939: avoid unintended sign extension on a 24 bit shift (bsc#1051510).\n- rtl8187: Fix NULL pointer dereference in priv-\u003econf_mutex (bsc#1051510).\n- rtlwifi: rtl8192cu: Remove variable self-assignment in rf.c (bsc#1051510).\n- rxrpc: Fix send in rxrpc_send_data_packet() (networking-stable-18_03_07).\n- s390/archrandom: Reconsider s390 arch random implementation (bnc#1096753, LTC#168037).\n- s390/archrandom: Rework arch random implementation (bnc#1096753, LTC#168037).\n- s390/cio: update chpid descriptor after resource accessibility event (bnc#1093148, LTC#167307).\n- s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero (bnc#1096753, LTC#168037).\n- s390/dasd: fix IO error for newly defined devices (bnc#1093148, LTC#167307).\n- s390/qdio: do not merge ERROR output buffers (bsc#1099715).\n- s390/qdio: fix access to uninitialized qdio_q fields (bnc#1096753, LTC#168037).\n- s390/qeth: do not dump control cmd twice (bsc#1099715).\n- s390/qeth: fix IPA command submission race (networking-stable-18_03_07).\n- s390/qeth: fix IPA command submission race (bsc#1099715).\n- s390/qeth: fix MAC address update sequence (bnc#1093148, LTC#167307).\n- s390/qeth: fix overestimated count of buffer elements (bsc#1099715).\n- s390/qeth: fix overestimated count of buffer elements (networking-stable-18_03_07).\n- s390/qeth: free netdevice when removing a card (networking-stable-18_03_28).\n- s390/qeth: free netdevice when removing a card (bsc#1099715).\n- s390/qeth: lock read device while queueing next buffer (bsc#1099715).\n- s390/qeth: lock read device while queueing next buffer (networking-stable-18_03_28).\n- s390/qeth: translate SETVLAN/DELVLAN errors (bnc#1093148, LTC#167307).\n- s390/qeth: use Read device to query hypervisor for MAC (bsc#1061024).\n- s390/qeth: when thread completes, wake up all waiters (bsc#1099715).\n- s390/qeth: when thread completes, wake up all waiters (networking-stable-18_03_28).\n- s390/uprobes: implement arch_uretprobe_is_alive() (bnc#1093148, LTC#167307).\n- s390/zcrypt: Fix CCA and EP11 CPRB processing failure memory leak (bnc#1096753, LTC#168037).\n- sch_netem: fix skb leak in netem_enqueue() (networking-stable-18_03_28).\n- sched/numa: Stagger NUMA balancing scan periods for new threads (Automatic NUMA Balancing ()).\n- sched: Make resched_cpu() unconditional (Git-fixes).\n- sched: Stop resched_cpu() from sending IPIs to offline CPUs (Git-fixes).\n- sched: Stop switched_to_rt() from sending IPIs to offline CPUs (Git-fixes).\n- scripts/git_sort/git_sort.py:\n- scripts/git_sort/git_sort.py: add Viro\u0027s vfs git\n- scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte() (bsc#1099918).\n- scsi: ipr: Format HCAM overlay ID 0x41 (bsc#1097961).\n- scsi: ipr: new IOASC update (bsc#1097961).\n- scsi: lpfc: Add per io channel NVME IO statistics (bsc#1088866).\n- scsi: lpfc: Change IO submit return to EBUSY if remote port is recovering (bsc#1088866).\n- scsi: lpfc: Comment cleanup regarding Broadcom copyright header (bsc#1088866).\n- scsi: lpfc: Correct fw download error message (bsc#1088866).\n- scsi: lpfc: Correct missing remoteport registration during link bounces (bsc#1088866).\n- scsi: lpfc: Correct target queue depth application changes (bsc#1088866).\n- scsi: lpfc: Driver NVME load fails when CPU cnt \u003e WQ resource cnt (bsc#1088866).\n- scsi: lpfc: Enhance log messages when reporting CQE errors (bsc#1088866).\n- scsi: lpfc: Enlarge nvmet asynchronous receive buffer counts (bsc#1088866).\n- scsi: lpfc: Fix 16gb hbas failing cq create (bsc#1093290).\n- scsi: lpfc: Fix Abort request WQ selection (bsc#1088866).\n- scsi: lpfc: Fix MDS diagnostics failure (Rx andlt; Tx) (bsc#1088866).\n- scsi: lpfc: Fix NULL pointer access in lpfc_nvme_info_show (bsc#1088866).\n- scsi: lpfc: Fix NULL pointer reference when resetting adapter (bsc#1088866).\n- scsi: lpfc: Fix crash in blk_mq layer when executing modprobe -r lpfc (bsc#1088866).\n- scsi: lpfc: Fix driver not recovering NVME rports during target link faults (bsc#1088866).\n- scsi: lpfc: Fix lingering lpfc_wq resource after driver unload (bsc#1088866).\n- scsi: lpfc: Fix multiple PRLI completion error path (bsc#1088866).\n- scsi: lpfc: Fix nvme remoteport registration race conditions (bsc#1088866).\n- scsi: lpfc: Fix port initialization failure (bsc#1093290).\n- scsi: lpfc: Fix up log messages and stats counters in IO submit code path (bsc#1088866).\n- scsi: lpfc: Handle new link fault code returned by adapter firmware (bsc#1088866).\n- scsi: lpfc: correct oversubscription of nvme io requests for an adapter (bsc#1088866).\n- scsi: lpfc: enhance LE data structure copies to hardware (bsc#1088866).\n- scsi: lpfc: fix spelling mistakes: \u0027mabilbox\u0027 and \u0027maibox\u0027 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.2 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.3 (bsc#1088866).\n- scsi: lpfc: update driver version to 12.0.0.4 (bsc#1088866).\n- scsi: qla2xxx: Add FC-NVMe abort processing (bsc#1084570).\n- scsi: qla2xxx: Add changes for devloss timeout in driver (bsc#1084570).\n- scsi: qla2xxx: Cleanup code to improve FC-NVMe error handling (bsc#1084570).\n- scsi: qla2xxx: Delete session for nport id change (bsc#1077338).\n- scsi: qla2xxx: Fix Async GPN_FT for FCP and FC-NVMe scan (bsc#1084570).\n- scsi: qla2xxx: Fix FC-NVMe IO abort during driver reset (bsc#1084570).\n- scsi: qla2xxx: Fix n2n_ae flag to prevent dev_loss on PDB change (bsc#1084570).\n- scsi: qla2xxx: Fix retry for PRLI RJT with reason of BUSY (bsc#1084570).\n- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1077338).\n- scsi: qla2xxx: Remove nvme_done_list (bsc#1084570).\n- scsi: qla2xxx: Remove unneeded message and minor cleanup for FC-NVMe (bsc#1084570).\n- scsi: qla2xxx: Restore ZIO threshold setting (bsc#1084570).\n- scsi: qla2xxx: Return busy if rport going away (bsc#1084570).\n- scsi: qla2xxx: Set IIDMA and fcport state before qla_nvme_register_remote() (bsc#1084570).\n- scsi: qla2xxx: Update driver version to 10.00.00.06-k (bsc#1084570).\n- scsi: raid_class: Add \u0027JBOD\u0027 RAID level (bsc#1093023).\n- scsi: sg: mitigate read/write abuse (bsc#1101296).\n- scsi: target: fix crash with iscsi target and dvd (bsc#1099918).\n- sctp: delay the authentication for the duplicated cookie-echo chunk (networking-stable-18_05_15).\n- sctp: do not check port in sctp_inet6_cmp_addr (networking-stable-18_04_26).\n- sctp: do not leak kernel memory to user space (networking-stable-18_04_10).\n- sctp: do not retransmit upon FragNeeded if PMTU discovery is disabled (networking-stable-18_01_12).\n- sctp: fix dst refcnt leak in sctp_v6_get_dst() (networking-stable-18_03_07).\n- sctp: fix the handling of ICMP Frag Needed for too small MTUs (networking-stable-18_01_12).\n- sctp: fix the issue that the cookie-ack with auth can\u0027t get processed (networking-stable-18_05_15).\n- sctp: full support for ipv6 ip_nonlocal_bind and IP_FREEBIND (networking-stable-17_11_14).\n- sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr (git-fixes).\n- sctp: potential read out of bounds in sctp_ulpevent_type_enabled() (networking-stable-17_10_09).\n- sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg (networking-stable-18_05_15).\n- sctp: reset owner sk for data chunks on out queues when migrating a sock (networking-stable-17_11_14).\n- sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6 (networking-stable-18_04_10).\n- sctp: use right member as the param of list_for_each_entry (git-fixes).\n- sctp: use the old asoc when making the cookie-ack chunk in dupcook_d (networking-stable-18_05_15).\n- sdhci: Advertise 2.0v supply on SDIO host controller (bsc#1051510).\n- selinux: KASAN: slab-out-of-bounds in xattr_getsecurity (bsc#1051510).\n- selinux: ensure the context is NUL terminated in security_context_to_sid_core() (bsc#1051510).\n- selinux: skip bounded transition processing if the policy isn\u0027t loaded (bsc#1051510).\n- serdev: fix memleak on module unload (bsc#1051510).\n- serdev: fix receive_buf return value when no callback (bsc#1051510).\n- serdev: fix registration of second slave (bsc#1051510).\n- serdev: ttyport: add missing open() error handling (bsc#1051510).\n- serdev: ttyport: add missing receive_buf sanity checks (bsc#1051510).\n- serdev: ttyport: enforce tty-driver open() requirement (bsc#1051510).\n- serdev: ttyport: fix NULL-deref on hangup (bsc#1051510).\n- serdev: ttyport: fix tty locking in close (bsc#1051510).\n- serial: 8250: Preserve DLD[7:4] for PORT_XR17V35X (bsc#1051510).\n- serial: 8250: omap: Fix idling of clocks for unused uarts (bsc#1051510).\n- serial: 8250_dw: Disable clock on error (bsc#1051510).\n- serial: 8250_fintek: Fix finding base_port with activated SuperIO (bsc#1051510).\n- serial: 8250_pci: Add Brainboxes UC-260 4 port serial device (bsc#1051510).\n- serial: altera: ensure port-\u003eregshift is honored consistently (bsc#1051510).\n- serial: arc_uart: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: core: mark port as initialized in autoconfig (bsc#1051510).\n- serial: fsl_lpuart: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: imx: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: imx: Only wakeup via RTSDEN bit if the system has RTS/CTS (bsc#1051510).\n- serial: mxs-auart: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: omap: Fix EFR write on RTS deassertion (bsc#1051510).\n- serial: samsung: Fix out-of-bounds access through serial port index (bsc#1051510).\n- serial: samsung: fix maxburst parameter for DMA transactions (bsc#1051510).\n- serial: sh-sci: Fix out-of-bounds access through DT alias (bsc#1051510).\n- serial: sh-sci: Stop using printk format %pCr (bsc#1051510).\n- serial: sh-sci: prevent lockup on full TTY buffers (bsc#1051510).\n- serial: xuartps: Fix out-of-bounds access through DT alias (bsc#1051510).\n- sget(): handle failures of register_shrinker() (bsc#1052766).\n- sh_eth: fix SH7757 GEther initialization (networking-stable-18_01_12).\n- sh_eth: fix TSU resource handling (networking-stable-18_01_12).\n- skbuff: Fix not waking applications when errors are enqueued (networking-stable-18_03_28).\n- sky2: Increase D3 delay to sky2 stops working after suspend (bsc#1051510).\n- slip: Check if rstate is initialized before uncompressing (networking-stable-18_04_13).\n- sock: free skb in skb_complete_tx_timestamp on error (networking-stable-17_12_31).\n- soreuseport: fix mem leak in reuseport_add_sock() (networking-stable-18_02_06).\n- spi: Fix scatterlist elements size in spi_map_buf (bsc#1051510).\n- spi: a3700: Fix clk prescaling for coefficient over 15 (bsc#1051510).\n- spi: a3700: Return correct value on timeout detection (bsc#1051510).\n- spi: armada-3700: Fix failing commands with quad-SPI (bsc#1051510).\n- spi: atmel: fixed spin_lock usage inside atmel_spi_remove (bsc#1051510).\n- spi: atmel: init FIFOs before spi enable (bsc#1051510).\n- spi: bcm-qspi: Fix use after free in bcm_qspi_probe() in error path (bsc#1051510).\n- spi: imx: do not access registers while clocks disabled (bsc#1051510).\n- spi: sh-msiof: Fix DMA transfer size check (bsc#1051510).\n- spi: spi-axi: fix potential use-after-free after deregistration (bsc#1051510).\n- spi: sun4i: disable clocks in the remove function (bsc#1051510).\n- spi: sun6i: disable/unprepare clocks on remove (bsc#1051510).\n- spi: xilinx: Detect stall with Unknown commands (bsc#1051510).\n- srcu: Provide ordering for CPU not involved in grace period (bsc#1052766).\n- staging: bcm2835-audio: Release resources on module_exit() (bsc#1051510).\n- staging: comedi: fix comedi_nsamples_left (bsc#1051510).\n- staging: comedi: ni_mio_common: ack ai fifo error interrupts (bsc#1051510).\n- staging: iio: ad5933: switch buffer mode to software (bsc#1051510).\n- staging: iio: ad7192: Fix - use the dedicated reset function avoiding dma from stack (bsc#1051510).\n- staging: iio: adc: ad7192: fix external frequency setting (bsc#1051510).\n- staging: rtl8192u: return -ENOMEM on failed allocation of priv-\u003eoldaddr (bsc#1051510).\n- staging: vchiq_2835_arm: Fix NULL ptr dereference in free_pagelist (bsc#1051510).\n- staging: wilc1000: Fix bssid buffer offset in Txq (bsc#1051510).\n- stm class: Fix a use-after-free (bsc#1051510).\n- stm class: Use vmalloc for the master map (bsc#1051510).\n- stmmac: reset last TSO segment size after device open (networking-stable-17_12_12).\n- strparser: Do not call mod_delayed_work with a timeout of LONG_MAX (networking-stable-18_04_26).\n- strparser: Fix incorrect strp-\u003eneed_bytes value (networking-stable-18_04_26).\n- strparser: Fix sign of err codes (networking-stable-18_04_10).\n- sunrpc: remove incorrect HMAC request initialization (bsc#1051510).\n- supported.conf: Remove external flag from iwlwifi modules (bsc#1093273)\n- supported.conf: fix folder of the driver module\n- swap: divide-by-zero when zero length swap file on ssd (bsc#1051510).\n- swiotlb: suppress warning when __GFP_NOWARN is set (bsc#1051510).\n- tap: reference to KVA of an unloaded module causes kernel panic (networking-stable-17_11_14).\n- target: transport should handle st FM/EOM/ILI reads (bsc#1081599).\n- tcp: do not read out-of-bounds opsize (networking-stable-18_04_26).\n- tcp: fix data delivery rate (networking-stable-17_10_09).\n- tcp: ignore Fast Open on repair mode (networking-stable-18_05_15).\n- tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets (networking-stable-18_04_26).\n- tcp: release sk_frag.page in tcp_disconnect (networking-stable-18_02_06).\n- tcp: revert F-RTO extension to detect more spurious timeouts (networking-stable-18_03_07).\n- tcp: revert F-RTO middle-box workaround (bsc#1076830).\n- tcp_bbr: fix to zero idle_restart only upon S/ACKed data (networking-stable-18_05_15).\n- tcp_bbr: record \u0027full bw reached\u0027 decision in new full_bw_reached bit (networking-stable-17_12_31).\n- tcp_bbr: reset full pipe detection on loss recovery undo (networking-stable-17_12_31).\n- tcp_bbr: reset long-term bandwidth sampling on loss recovery undo (networking-stable-17_12_31).\n- tcp_nv: fix division by zero in tcpnv_acked() (networking-stable-17_11_20).\n- team: Fix double free in error path (networking-stable-18_03_28).\n- team: avoid adding twice the same option to the event list (networking-stable-18_04_26).\n- team: fix netconsole setup over team (networking-stable-18_04_26).\n- team: move dev_mc_sync after master_upper_dev_link in team_port_add (networking-stable-18_04_10).\n- tee: check shm references are consistent in offset/size (bsc#1051510).\n- tee: shm: fix use-after-free via temporarily dropped reference (bsc#1051510).\n- test_firmware: fix missing unlock on error in config_num_requests_store() (bsc#1051510).\n- test_firmware: fix setting old custom fw path back on exit (bsc#1051510).\n- test_firmware: fix setting old custom fw path back on exit, second try (bsc#1051510).\n- tg3: APE heartbeat changes (bsc#1086286).\n- tg3: Add Macronix NVRAM support (bsc#1086286).\n- tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent() (bsc#1086286).\n- tg3: prevent scheduling while atomic splat (bsc#1086286).\n- thermal/drivers/step_wise: Fix temperature regulation misbehavior (bsc#1051510).\n- thermal: bcm2835: Stop using printk format %pCr (bsc#1051510).\n- thermal: enable broadcom menu for arm64 bcm2835 (bsc#1095573).\n- thermal: exynos: Propagate error value from tmu_read() (bsc#1051510).\n- thermal: exynos: Reading temperature makes sense only when TMU is turned on (bsc#1051510).\n- thermal: imx: Fix race condition in imx_thermal_probe() (bsc#1051510).\n- thermal: int3400_thermal: fix error handling in int3400_thermal_probe() (bsc#1051510).\n- thermal: int3403_thermal: Fix NULL pointer deref on module load / probe (bsc#1051510).\n- thermal: power_allocator: fix one race condition issue for thermal_instances list (bsc#1051510).\n- thunderbolt: Prevent crash when ICM firmware is not running (bsc#1090888).\n- thunderbolt: Resume control channel after hibernation image is created (bsc#1051510).\n- thunderbolt: Serialize PCIe tunnel creation with PCI rescan (bsc#1090888).\n- thunderbolt: Wait a bit longer for ICM to authenticate the active NVM (bsc#1090888).\n- timekeeping: Eliminate the stale declaration of ktime_get_raw_and_real_ts64() (bsc#1099918).\n- timers: Invoke timer_start_debug() where it makes sense (Git-fixes).\n- timers: Reinitialize per cpu bases on hotplug (Git-fixes).\n- timers: Unconditionally check deferrable base (Git-fixes).\n- timers: Use deferrable base independent of base::nohz_active (Git-fixes).\n- tipc: add policy for TIPC_NLA_NET_ADDR (networking-stable-18_04_26).\n- tipc: fix a memory leak in tipc_nl_node_get_link() (networking-stable-18_01_28).\n- tipc: fix hanging poll() for stream sockets (networking-stable-17_12_31).\n- tipc: fix memory leak in tipc_accept_from_sock() (networking-stable-17_12_12).\n- tools headers: Restore READ_ONCE() C++ compatibility (bsc#1093023).\n- tools/lib/subcmd/pager.c: do not alias select() params (Fix gcc 8 restrict error).\n- tracing/uprobe_event: Fix strncpy corner case (bsc#1099918).\n- tracing: Fix converting enum\u0027s from the map in trace_event_eval_update() (bsc#1099918).\n- tracing: Fix missing tab for hwlat_detector print format (bsc#1099918).\n- tracing: Kconfig text fixes for CONFIG_HWLAT_TRACER (bsc#1099918).\n- tracing: Make the snapshot trigger work with instances (bsc#1099918).\n- tracing: probeevent: Fix to support minus offset from symbol (bsc#1099918).\n- tty fix oops when rmmod 8250 (bsc#1051510).\n- tty/serial: atmel: add new version check for usart (bsc#1051510).\n- tty/serial: atmel: use port-\u003ename as name in request_irq() (bsc#1051510).\n- tty: Avoid possible error pointer dereference at tty_ldisc_restore() (bsc#1051510).\n- tty: Do not call panic() at tty_ldisc_init() (bsc#1051510).\n- tty: Use __GFP_NOFAIL for tty_ldisc_get() (bsc#1051510).\n- tty: fix __tty_insert_flip_char regression (bsc#1051510).\n- tty: fix tty_ldisc_receive_buf() documentation (bsc#1051510).\n- tty: improve tty_insert_flip_char() fast path (bsc#1051510).\n- tty: improve tty_insert_flip_char() slow path (bsc#1051510).\n- tty: make n_tty_read() always abort if hangup is in progress (bsc#1051510).\n- tty: n_gsm: Allow ADM response in addition to UA for control dlci (bsc#1051510).\n- tty: n_gsm: Fix DLCI handling for ADM mode if debug and 2 is not set (bsc#1051510).\n- tty: n_gsm: Fix long delays with control frame timeouts in ADM mode (bsc#1051510).\n- tty: pl011: Avoid spuriously stuck-off interrupts (bsc#1051510).\n- tty: vt: fix up tabstops properly (bsc#1051510).\n- tun/tap: sanitize TUNSETSNDBUF input (networking-stable-17_11_14).\n- tun: allow positive return values on dev_get_valid_name() call (networking-stable-17_11_14).\n- tun: bail out from tun_get_user() if the skb is empty (networking-stable-17_10_09).\n- tun: call dev_get_valid_name() before register_netdevice() (networking-stable-17_11_14).\n- ubi: Fix error for write access (bsc#1051510).\n- ubi: Fix race condition between ubi volume creation and udev (bsc#1051510).\n- ubi: Reject MLC NAND (bsc#1051510).\n- ubi: block: Fix locking for idr_alloc/idr_remove (bsc#1051510).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n- ubi: fastmap: Cancel work upon detach (bsc#1051510).\n- ubi: fastmap: Do not flush fastmap work on detach (bsc#1051510).\n- ubi: fastmap: Erase outdated anchor PEBs during attach (bsc#1051510).\n- ubifs: Check ubifs_wbuf_sync() return code (bsc#1052766).\n- ubifs: free the encrypted symlink target (bsc#1052766).\n- udf: Avoid overflow when session starts at large offset (bsc#1052766).\n- udf: Fix leak of UTF-16 surrogates into encoded strings (bsc#1052766).\n- usb: core: Add quirk for HP v222w 16GB Mini (bsc#1090888).\n- usb: quirks: add control message delay for 1b1c:1b20 (bsc#1087092).\n- usb: typec: ucsi: Fix for incorrect status data issue (bsc#1100132).\n- usb: typec: ucsi: Increase command completion timeout value (bsc#1090888).\n- usb: typec: ucsi: acpi: Workaround for cache mode issue (bsc#1100132).\n- usb: xhci: Disable slot even when virt-dev is null (bsc#1085539).\n- usb: xhci: Fix potential memory leak in xhci_disable_slot() (bsc#1085539).\n- usb: xhci: Make some static functions global ().\n- usbip: usbip_host: delete device from busid_table after rebind (bsc#1096480).\n- usbip: usbip_host: fix NULL-ptr deref and use-after-free errors (bsc#1096480).\n- usbip: usbip_host: fix bad unlock balance during stub_probe() (bsc#1096480).\n- usbip: usbip_host: fix to hold parent lock for device_attach() calls (bsc#1096480).\n- usbip: usbip_host: run rebind from exit when module is removed (bsc#1096480).\n- usbip: vudc: fix null pointer dereference on udc-\u003elock (bsc#1087092).\n- userns: Do not fail follow_automount based on s_user_ns (bsc#1099918).\n- vfb: fix video mode and line_length being set when loaded (bsc#1100362).\n- vfio: Use get_user_pages_longterm correctly (bsc#1095337).\n- vfio: disable filesystem-dax page pinning (bsc#1095337).\n- vfio: platform: Fix reset module leak in error path (bsc#1099918).\n- vhost: Fix vhost_copy_to_user() (networking-stable-18_04_13).\n- vhost: correctly remove wait queue during poll failure (networking-stable-18_04_10).\n- vhost: fix vhost_vq_access_ok() log check (networking-stable-18_04_13).\n- vhost: validate log when IOTLB is enabled (networking-stable-18_04_10).\n- vhost_net: add missing lock nesting notation (networking-stable-18_04_10).\n- vhost_net: stop device during reset owner (networking-stable-18_02_06).\n- video/fbdev/stifb: Return -ENOMEM after a failed kzalloc() in stifb_init_fb() (bsc#1090888 bsc#1099966).\n- video/hdmi: Allow \u0027empty\u0027 HDMI infoframes (bsc#1051510).\n- video: fbdev/mmp: add MODULE_LICENSE (bsc#1051510).\n- video: fbdev: atmel_lcdfb: fix display-timings lookup (bsc#1051510).\n- video: fbdev: aty: do not leak uninitialized padding in clk to userspace (bsc#1051510).\n- video: fbdev: au1200fb: Release some resources if a memory allocation fails (bsc#1051510).\n- video: fbdev: au1200fb: Return an error code if a memory allocation fails (bsc#1051510).\n- virtio-gpu: fix ioctl and expose the fixed status to userspace (bsc#1100382).\n- virtio: add ability to iterate over vqs (bsc#1051510).\n- virtio: release virtio index when fail to device_register (bsc#1051510).\n- virtio_console: do not tie bufs to a vq (bsc#1051510).\n- virtio_console: drop custom control queue cleanup (bsc#1051510).\n- virtio_console: free buffers after reset (bsc#1051510).\n- virtio_console: move removal code (bsc#1051510).\n- virtio_console: reset on out of memory (bsc#1051510).\n- virtio_net: fix adding vids on big-endian (networking-stable-18_04_26).\n- virtio_net: split out ctrl buffer (networking-stable-18_04_26).\n- virtio_ring: fix num_free handling in error case (bsc#1051510).\n- vlan: Fix reading memory beyond skb-\u003etail in skb_vlan_tagged_multi (networking-stable-18_04_26).\n- vlan: also check phy_driver ts_info for vlan\u0027s real device (networking-stable-18_04_10).\n- vlan: fix a use-after-free in vlan_device_event() (networking-stable-17_11_20).\n- vmw_balloon: fix inflation with batching (bsc#1051510).\n- vmw_balloon: fixing double free when batching mode is off (bsc#1051510).\n- vmxnet3: avoid xmit reset due to a race in vmxnet3 (bsc#1091860).\n- vmxnet3: fix incorrect dereference when rxvlan is disabled (bsc#1091860).\n- vmxnet3: increase default rx ring sizes (bsc#1091860).\n- vmxnet3: repair memory leak (bsc#1051510).\n- vmxnet3: set the DMA mask before the first DMA map operation (bsc#1091860).\n- vmxnet3: use DMA memory barriers where required (bsc#1091860).\n- vmxnet3: use correct flag to indicate LRO feature (bsc#1091860).\n- vrf: Fix use after free and double free in vrf_finish_output (networking-stable-18_04_10).\n- vt6655: Fix a possible sleep-in-atomic bug in vt6655_suspend (bsc#1051510).\n- vt: change SGR 21 to follow the standards (bsc#1051510).\n- vt: prevent leaking uninitialized data to userspace via /dev/vcs* (bsc#1051510).\n- vti6: Change minimum MTU to IPV4_MIN_MTU, vti6 can carry IPv4 too (bsc#1082869).\n- vti6: Fix dev-\u003emax_mtu setting (bsc#1082869).\n- vti6: Keep set MTU on link creation or change, validate it (bsc#1082869).\n- vti6: Properly adjust vti6 MTU from MTU of lower device (bsc#1082869).\n- vti6: better validate user provided tunnel names (networking-stable-18_04_10).\n- vti: fix use after free in vti_tunnel_xmit/vti6_tnl_xmit (bsc#1076830).\n- vxlan: fix the issue that neigh proxy blocks all icmpv6 packets (networking-stable-17_11_20).\n- w1: mxc_w1: Enable clock before calling clk_get_rate() on it (bsc#1051510).\n- wait: add wait_event_killable_timeout() (bsc#1099792).\n- watchdog: da9063: Fix setting/changing timeout (bsc#1100843).\n- watchdog: da9063: Fix timeout handling during probe (bsc#1100843).\n- watchdog: da9063: Fix updating timeout value (bsc#1100843).\n- watchdog: f71808e_wdt: Fix WD_EN register read (bsc#1051510).\n- watchdog: f71808e_wdt: Fix magic close handling (bsc#1051510).\n- watchdog: sp5100_tco: Fix watchdog disable bit (bsc#1051510).\n- wcn36xx: Fix dynamic power saving (bsc#1051510).\n- wcn36xx: Introduce mutual exclusion of fw configuration (bsc#1051510).\n- wl1251: check return from call to wl1251_acx_arp_ip_filter (bsc#1051510).\n- workqueue: Allow retrieval of current task\u0027s work struct (bsc#1051510).\n- workqueue: use put_device() instead of kfree() (bsc#1051510).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158).\n- x86/cpu_entry_area: Map also trace_idt_table (bsc#1089878).\n- x86/intel_rdt: Add command line parameter to control L2_CDP ().\n- x86/intel_rdt: Add two new resources for L2 Code and Data Prioritization (CDP) ().\n- x86/intel_rdt: Enable L2 CDP in MSR IA32_L2_QOS_CFG ().\n- x86/intel_rdt: Enumerate L2 Code and Data Prioritization (CDP) feature ().\n- x86/mm: add a function to check if a pfn is UC/UC-/WC (bsc#1087213).\n- x86/pkeys: Add arch_pkeys_enabled() (bsc#1078248).\n- x86/pkeys: Move vma_pkey() into asm/pkeys.h (bsc#1078248).\n- x86/pti: do not report XenPV as vulnerable (bsc#1097551).\n- x86/setup: Do not reserve a crash kernel region if booted on Xen PV (bsc#1085626).\n- x86/stacktrace: Clarify the reliable success paths (bnc#1058115).\n- x86/stacktrace: Do not fail for ORC with regs on stack (bnc#1058115).\n- x86/stacktrace: Do not unwind after user regs (bnc#1058115).\n- x86/stacktrace: Enable HAVE_RELIABLE_STACKTRACE for the ORC unwinder (bnc#1058115).\n- x86/stacktrace: Remove STACKTRACE_DUMP_ONCE (bnc#1058115).\n- x86/tsc: Future-proof native_calibrate_tsc() (bsc#1074873).\n- x86/unwind/orc: Detect the end of the stack (bnc#1058115).\n- xen/acpi: off by one in read_acpi_id() (bnc#1065600).\n- xen/netfront: raise max number of slots in xennet_get_responses() (bnc#1076049).\n- xen: do not print error message in case of missing Xenstore entry (bnc#1065600).\n- xhci: Add port status decoder for tracing purposes ().\n- xhci: Fix USB ports for Dell Inspiron 5775 (bsc#1090888).\n- xhci: add definitions for all port link states ().\n- xhci: add port speed ID to portsc tracing ().\n- xhci: add port status tracing ().\n- xhci: fix endpoint context tracer output (bsc#1087092).\n- xhci: workaround for AMD Promontory disabled ports wakeup (bsc#1087092).\n- xhci: zero usb device slot_id member when disabling and freeing a xhci slot (bsc#1090888).\n- xprtrdma: Fix list corruption / DMAR errors during MR recovery (git-fixes).\n- xprtrdma: Return -ENOBUFS when no pages are available (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-1420,SUSE-SLE-Module-Development-Tools-15-2018-1420,SUSE-SLE-Module-Legacy-15-2018-1420,SUSE-SLE-Module-Live-Patching-15-2018-1420,SUSE-SLE-Product-HA-15-2018-1420,SUSE-SLE-Product-WE-15-2018-1420", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2092-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2092-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2092-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004334.html" }, { "category": "self", "summary": "SUSE Bug 1046303", "url": "https://bugzilla.suse.com/1046303" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1046307", "url": "https://bugzilla.suse.com/1046307" }, { "category": "self", "summary": "SUSE Bug 1046540", "url": "https://bugzilla.suse.com/1046540" }, { "category": "self", "summary": "SUSE Bug 1046542", "url": "https://bugzilla.suse.com/1046542" }, { "category": "self", "summary": "SUSE Bug 1046543", "url": "https://bugzilla.suse.com/1046543" }, { "category": "self", "summary": "SUSE Bug 1048129", "url": "https://bugzilla.suse.com/1048129" }, { "category": "self", "summary": "SUSE Bug 1050242", "url": "https://bugzilla.suse.com/1050242" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050529", "url": "https://bugzilla.suse.com/1050529" }, { "category": "self", "summary": "SUSE Bug 1050536", "url": "https://bugzilla.suse.com/1050536" }, { "category": "self", "summary": "SUSE Bug 1050538", "url": "https://bugzilla.suse.com/1050538" }, { "category": "self", "summary": "SUSE Bug 1050545", "url": "https://bugzilla.suse.com/1050545" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1050662", "url": "https://bugzilla.suse.com/1050662" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1052766", "url": "https://bugzilla.suse.com/1052766" }, { "category": "self", "summary": "SUSE Bug 1055968", "url": "https://bugzilla.suse.com/1055968" }, { "category": "self", "summary": "SUSE Bug 1056427", "url": "https://bugzilla.suse.com/1056427" }, { "category": "self", "summary": "SUSE Bug 1056643", "url": "https://bugzilla.suse.com/1056643" }, { "category": "self", "summary": "SUSE Bug 1056651", "url": "https://bugzilla.suse.com/1056651" }, { "category": "self", "summary": "SUSE Bug 1056653", "url": "https://bugzilla.suse.com/1056653" }, { "category": "self", "summary": "SUSE Bug 1056657", "url": "https://bugzilla.suse.com/1056657" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056686", "url": "https://bugzilla.suse.com/1056686" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1058513", "url": "https://bugzilla.suse.com/1058513" }, { "category": "self", "summary": "SUSE Bug 1058659", "url": "https://bugzilla.suse.com/1058659" }, { "category": "self", "summary": "SUSE Bug 1058717", "url": "https://bugzilla.suse.com/1058717" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1061024", "url": "https://bugzilla.suse.com/1061024" }, { "category": "self", "summary": "SUSE Bug 1061840", "url": "https://bugzilla.suse.com/1061840" }, { "category": "self", "summary": "SUSE Bug 1062897", "url": "https://bugzilla.suse.com/1062897" }, { "category": "self", "summary": "SUSE Bug 1064802", "url": "https://bugzilla.suse.com/1064802" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066110", "url": "https://bugzilla.suse.com/1066110" }, { "category": "self", "summary": "SUSE Bug 1066129", "url": "https://bugzilla.suse.com/1066129" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1068054", "url": "https://bugzilla.suse.com/1068054" }, { "category": "self", "summary": "SUSE Bug 1071218", "url": "https://bugzilla.suse.com/1071218" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1072829", "url": "https://bugzilla.suse.com/1072829" }, { "category": "self", "summary": "SUSE Bug 1072856", "url": "https://bugzilla.suse.com/1072856" }, { "category": "self", "summary": "SUSE Bug 1073513", "url": "https://bugzilla.suse.com/1073513" }, { "category": "self", "summary": "SUSE Bug 1073765", "url": "https://bugzilla.suse.com/1073765" }, { "category": "self", "summary": "SUSE Bug 1073960", "url": "https://bugzilla.suse.com/1073960" }, { "category": "self", "summary": "SUSE Bug 1074562", "url": "https://bugzilla.suse.com/1074562" }, { "category": "self", "summary": "SUSE Bug 1074578", "url": "https://bugzilla.suse.com/1074578" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1074741", "url": "https://bugzilla.suse.com/1074741" }, { "category": "self", "summary": "SUSE Bug 1074873", "url": "https://bugzilla.suse.com/1074873" }, { "category": "self", "summary": "SUSE Bug 1074919", "url": "https://bugzilla.suse.com/1074919" }, { "category": "self", "summary": "SUSE Bug 1075006", "url": "https://bugzilla.suse.com/1075006" }, { "category": "self", "summary": "SUSE Bug 1075007", "url": "https://bugzilla.suse.com/1075007" }, { "category": "self", "summary": "SUSE Bug 1075262", "url": "https://bugzilla.suse.com/1075262" }, { "category": "self", "summary": "SUSE Bug 1075419", "url": "https://bugzilla.suse.com/1075419" }, { "category": "self", "summary": "SUSE Bug 1075748", "url": "https://bugzilla.suse.com/1075748" }, { "category": "self", "summary": "SUSE Bug 1075876", "url": "https://bugzilla.suse.com/1075876" }, { "category": "self", "summary": "SUSE Bug 1076049", "url": "https://bugzilla.suse.com/1076049" }, { "category": "self", "summary": "SUSE Bug 1076115", "url": "https://bugzilla.suse.com/1076115" }, { "category": "self", "summary": "SUSE Bug 1076372", "url": "https://bugzilla.suse.com/1076372" }, { "category": "self", "summary": "SUSE Bug 1076830", "url": "https://bugzilla.suse.com/1076830" }, { "category": "self", "summary": "SUSE Bug 1077338", "url": "https://bugzilla.suse.com/1077338" }, { "category": "self", "summary": "SUSE Bug 1078248", "url": "https://bugzilla.suse.com/1078248" }, { "category": "self", "summary": "SUSE Bug 1078353", "url": "https://bugzilla.suse.com/1078353" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1079747", "url": "https://bugzilla.suse.com/1079747" }, { "category": "self", "summary": "SUSE Bug 1080039", "url": "https://bugzilla.suse.com/1080039" }, { "category": "self", "summary": "SUSE Bug 1080542", "url": "https://bugzilla.suse.com/1080542" }, { "category": "self", "summary": "SUSE Bug 1081599", "url": "https://bugzilla.suse.com/1081599" }, { "category": "self", "summary": "SUSE Bug 1082485", "url": "https://bugzilla.suse.com/1082485" }, { "category": "self", "summary": "SUSE Bug 1082504", "url": "https://bugzilla.suse.com/1082504" }, { "category": "self", "summary": "SUSE Bug 1082869", "url": "https://bugzilla.suse.com/1082869" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1084001", "url": "https://bugzilla.suse.com/1084001" }, { "category": "self", "summary": "SUSE Bug 1084570", "url": "https://bugzilla.suse.com/1084570" }, { "category": "self", "summary": "SUSE Bug 1085308", "url": "https://bugzilla.suse.com/1085308" }, { "category": "self", "summary": "SUSE Bug 1085539", "url": "https://bugzilla.suse.com/1085539" }, { "category": "self", "summary": "SUSE Bug 1085626", "url": "https://bugzilla.suse.com/1085626" }, { "category": "self", "summary": "SUSE Bug 1085933", "url": "https://bugzilla.suse.com/1085933" }, { "category": "self", "summary": "SUSE Bug 1085936", "url": "https://bugzilla.suse.com/1085936" }, { "category": "self", "summary": "SUSE Bug 1085937", "url": "https://bugzilla.suse.com/1085937" }, { "category": "self", "summary": "SUSE Bug 1085938", "url": "https://bugzilla.suse.com/1085938" }, { "category": "self", "summary": "SUSE Bug 1085939", "url": "https://bugzilla.suse.com/1085939" }, { "category": "self", "summary": "SUSE Bug 1085941", "url": "https://bugzilla.suse.com/1085941" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086283", "url": "https://bugzilla.suse.com/1086283" }, { "category": "self", "summary": "SUSE Bug 1086286", "url": "https://bugzilla.suse.com/1086286" }, { "category": "self", "summary": "SUSE Bug 1086288", "url": "https://bugzilla.suse.com/1086288" }, { "category": "self", "summary": "SUSE Bug 1086319", "url": "https://bugzilla.suse.com/1086319" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1086400", "url": "https://bugzilla.suse.com/1086400" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1086739", "url": "https://bugzilla.suse.com/1086739" }, { "category": "self", "summary": "SUSE Bug 1087078", "url": "https://bugzilla.suse.com/1087078" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087084", "url": "https://bugzilla.suse.com/1087084" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087205", "url": "https://bugzilla.suse.com/1087205" }, { "category": "self", "summary": "SUSE Bug 1087210", "url": "https://bugzilla.suse.com/1087210" }, { "category": "self", "summary": "SUSE Bug 1087213", "url": "https://bugzilla.suse.com/1087213" }, { "category": "self", "summary": "SUSE Bug 1087214", "url": "https://bugzilla.suse.com/1087214" }, { "category": "self", "summary": "SUSE Bug 1087284", "url": "https://bugzilla.suse.com/1087284" }, { "category": "self", "summary": "SUSE Bug 1087405", "url": "https://bugzilla.suse.com/1087405" }, { "category": "self", "summary": "SUSE Bug 1087458", "url": "https://bugzilla.suse.com/1087458" }, { "category": "self", "summary": "SUSE Bug 1087939", "url": "https://bugzilla.suse.com/1087939" }, { "category": "self", "summary": "SUSE Bug 1087978", "url": "https://bugzilla.suse.com/1087978" }, { "category": "self", "summary": "SUSE Bug 1088354", "url": "https://bugzilla.suse.com/1088354" }, { "category": "self", "summary": "SUSE Bug 1088690", "url": "https://bugzilla.suse.com/1088690" }, { "category": "self", "summary": "SUSE Bug 1088704", "url": "https://bugzilla.suse.com/1088704" }, { "category": "self", "summary": "SUSE Bug 1088722", "url": "https://bugzilla.suse.com/1088722" }, { "category": "self", "summary": "SUSE Bug 1088796", "url": "https://bugzilla.suse.com/1088796" }, { "category": "self", "summary": "SUSE Bug 1088804", "url": "https://bugzilla.suse.com/1088804" }, { "category": "self", "summary": "SUSE Bug 1088821", "url": "https://bugzilla.suse.com/1088821" }, { "category": "self", "summary": "SUSE Bug 1088866", "url": "https://bugzilla.suse.com/1088866" }, { "category": "self", "summary": "SUSE Bug 1089115", "url": "https://bugzilla.suse.com/1089115" }, { "category": "self", "summary": "SUSE Bug 1089268", "url": "https://bugzilla.suse.com/1089268" }, { "category": "self", "summary": "SUSE Bug 1089467", "url": "https://bugzilla.suse.com/1089467" }, { "category": "self", "summary": "SUSE Bug 1089608", "url": "https://bugzilla.suse.com/1089608" }, { "category": "self", "summary": "SUSE Bug 1089663", "url": "https://bugzilla.suse.com/1089663" }, { "category": "self", "summary": "SUSE Bug 1089664", "url": "https://bugzilla.suse.com/1089664" }, { "category": "self", "summary": "SUSE Bug 1089667", "url": "https://bugzilla.suse.com/1089667" }, { "category": "self", "summary": "SUSE Bug 1089669", "url": "https://bugzilla.suse.com/1089669" }, { "category": "self", "summary": "SUSE Bug 1089752", "url": "https://bugzilla.suse.com/1089752" }, { "category": "self", "summary": "SUSE Bug 1089753", "url": "https://bugzilla.suse.com/1089753" }, { "category": "self", "summary": "SUSE Bug 1089878", "url": "https://bugzilla.suse.com/1089878" }, { "category": "self", "summary": "SUSE Bug 1090150", "url": "https://bugzilla.suse.com/1090150" }, { "category": "self", "summary": "SUSE Bug 1090457", "url": "https://bugzilla.suse.com/1090457" }, { "category": "self", "summary": "SUSE Bug 1090605", "url": "https://bugzilla.suse.com/1090605" }, { "category": "self", "summary": "SUSE Bug 1090643", "url": "https://bugzilla.suse.com/1090643" }, { "category": "self", "summary": "SUSE Bug 1090646", "url": "https://bugzilla.suse.com/1090646" }, { "category": "self", "summary": "SUSE Bug 1090658", "url": "https://bugzilla.suse.com/1090658" }, { "category": "self", "summary": "SUSE Bug 1090734", "url": "https://bugzilla.suse.com/1090734" }, { "category": "self", "summary": "SUSE Bug 1090888", "url": "https://bugzilla.suse.com/1090888" }, { "category": "self", "summary": "SUSE Bug 1090953", "url": "https://bugzilla.suse.com/1090953" }, { "category": "self", "summary": "SUSE Bug 1091158", "url": "https://bugzilla.suse.com/1091158" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1091424", "url": "https://bugzilla.suse.com/1091424" }, { "category": "self", "summary": "SUSE Bug 1091594", "url": "https://bugzilla.suse.com/1091594" }, { "category": "self", "summary": "SUSE Bug 1091666", "url": "https://bugzilla.suse.com/1091666" }, { "category": "self", "summary": "SUSE Bug 1091678", "url": "https://bugzilla.suse.com/1091678" }, { "category": "self", "summary": "SUSE Bug 1091686", "url": "https://bugzilla.suse.com/1091686" }, { "category": "self", "summary": "SUSE Bug 1091781", "url": "https://bugzilla.suse.com/1091781" }, { "category": "self", "summary": "SUSE Bug 1091782", "url": "https://bugzilla.suse.com/1091782" }, { "category": "self", "summary": "SUSE Bug 1091815", "url": "https://bugzilla.suse.com/1091815" }, { "category": "self", "summary": "SUSE Bug 1091860", "url": "https://bugzilla.suse.com/1091860" }, { "category": "self", "summary": "SUSE Bug 1091960", "url": "https://bugzilla.suse.com/1091960" }, { "category": "self", "summary": "SUSE Bug 1092100", "url": "https://bugzilla.suse.com/1092100" }, { "category": "self", "summary": "SUSE Bug 1092472", "url": "https://bugzilla.suse.com/1092472" }, { "category": "self", "summary": "SUSE Bug 1092710", "url": "https://bugzilla.suse.com/1092710" }, { "category": "self", "summary": "SUSE Bug 1092772", "url": "https://bugzilla.suse.com/1092772" }, { "category": "self", "summary": "SUSE Bug 1092888", "url": "https://bugzilla.suse.com/1092888" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1092975", "url": "https://bugzilla.suse.com/1092975" }, { "category": "self", "summary": "SUSE Bug 1093023", "url": "https://bugzilla.suse.com/1093023" }, { "category": "self", "summary": "SUSE Bug 1093027", "url": "https://bugzilla.suse.com/1093027" }, { "category": "self", "summary": "SUSE Bug 1093035", "url": "https://bugzilla.suse.com/1093035" }, { "category": "self", "summary": "SUSE Bug 1093118", "url": "https://bugzilla.suse.com/1093118" }, { "category": "self", "summary": "SUSE Bug 1093148", "url": "https://bugzilla.suse.com/1093148" }, { "category": "self", "summary": "SUSE Bug 1093158", "url": "https://bugzilla.suse.com/1093158" }, { "category": "self", "summary": "SUSE Bug 1093184", "url": "https://bugzilla.suse.com/1093184" }, { "category": "self", "summary": "SUSE Bug 1093205", "url": "https://bugzilla.suse.com/1093205" }, { "category": "self", "summary": "SUSE Bug 1093273", "url": "https://bugzilla.suse.com/1093273" }, { "category": "self", "summary": "SUSE Bug 1093290", "url": "https://bugzilla.suse.com/1093290" }, { "category": "self", "summary": "SUSE Bug 1093604", "url": "https://bugzilla.suse.com/1093604" }, { "category": "self", "summary": "SUSE Bug 1093641", "url": "https://bugzilla.suse.com/1093641" }, { "category": "self", "summary": "SUSE Bug 1093649", "url": "https://bugzilla.suse.com/1093649" }, { "category": "self", "summary": "SUSE Bug 1093653", "url": "https://bugzilla.suse.com/1093653" }, { "category": "self", "summary": "SUSE Bug 1093655", "url": "https://bugzilla.suse.com/1093655" }, { "category": "self", "summary": "SUSE Bug 1093657", "url": "https://bugzilla.suse.com/1093657" }, { "category": "self", "summary": "SUSE Bug 1093663", "url": "https://bugzilla.suse.com/1093663" }, { "category": "self", "summary": "SUSE Bug 1093721", "url": "https://bugzilla.suse.com/1093721" }, { "category": "self", "summary": "SUSE Bug 1093728", "url": "https://bugzilla.suse.com/1093728" }, { "category": "self", "summary": "SUSE Bug 1093904", "url": "https://bugzilla.suse.com/1093904" }, { "category": "self", "summary": "SUSE Bug 1093990", "url": "https://bugzilla.suse.com/1093990" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094356", "url": "https://bugzilla.suse.com/1094356" }, { "category": "self", "summary": "SUSE Bug 1094420", "url": "https://bugzilla.suse.com/1094420" }, { "category": "self", "summary": "SUSE Bug 1094541", "url": "https://bugzilla.suse.com/1094541" }, { "category": "self", "summary": "SUSE Bug 1094575", "url": "https://bugzilla.suse.com/1094575" }, { "category": "self", "summary": "SUSE Bug 1094751", "url": "https://bugzilla.suse.com/1094751" }, { "category": "self", "summary": "SUSE Bug 1094825", "url": "https://bugzilla.suse.com/1094825" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1094912", "url": "https://bugzilla.suse.com/1094912" }, { "category": "self", "summary": "SUSE Bug 1094978", "url": "https://bugzilla.suse.com/1094978" }, { "category": "self", "summary": "SUSE Bug 1095042", "url": "https://bugzilla.suse.com/1095042" }, { "category": "self", "summary": "SUSE Bug 1095094", "url": "https://bugzilla.suse.com/1095094" }, { "category": "self", "summary": "SUSE Bug 1095115", "url": "https://bugzilla.suse.com/1095115" }, { "category": "self", "summary": "SUSE Bug 1095155", "url": "https://bugzilla.suse.com/1095155" }, { "category": "self", "summary": "SUSE Bug 1095265", "url": "https://bugzilla.suse.com/1095265" }, { "category": "self", "summary": "SUSE Bug 1095321", "url": "https://bugzilla.suse.com/1095321" }, { "category": "self", "summary": "SUSE Bug 1095337", "url": "https://bugzilla.suse.com/1095337" }, { "category": "self", "summary": "SUSE Bug 1095467", "url": "https://bugzilla.suse.com/1095467" }, { "category": "self", "summary": "SUSE Bug 1095573", "url": "https://bugzilla.suse.com/1095573" }, { "category": "self", "summary": "SUSE Bug 1095735", "url": "https://bugzilla.suse.com/1095735" }, { "category": "self", "summary": "SUSE Bug 1095893", "url": "https://bugzilla.suse.com/1095893" }, { "category": "self", "summary": "SUSE Bug 1096065", "url": "https://bugzilla.suse.com/1096065" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096529", "url": "https://bugzilla.suse.com/1096529" }, { "category": "self", "summary": "SUSE Bug 1096696", "url": "https://bugzilla.suse.com/1096696" }, { "category": "self", "summary": "SUSE Bug 1096705", "url": "https://bugzilla.suse.com/1096705" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1096753", "url": "https://bugzilla.suse.com/1096753" }, { "category": "self", "summary": "SUSE Bug 1096790", "url": "https://bugzilla.suse.com/1096790" }, { "category": "self", "summary": "SUSE Bug 1096793", "url": "https://bugzilla.suse.com/1096793" }, { "category": "self", "summary": "SUSE Bug 1097034", "url": "https://bugzilla.suse.com/1097034" }, { "category": "self", "summary": "SUSE Bug 1097105", "url": "https://bugzilla.suse.com/1097105" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE Bug 1097373", "url": "https://bugzilla.suse.com/1097373" }, { "category": "self", "summary": "SUSE Bug 1097439", "url": "https://bugzilla.suse.com/1097439" }, { "category": "self", "summary": "SUSE Bug 1097465", "url": "https://bugzilla.suse.com/1097465" }, { "category": "self", "summary": "SUSE Bug 1097468", "url": "https://bugzilla.suse.com/1097468" }, { "category": "self", "summary": "SUSE Bug 1097470", "url": "https://bugzilla.suse.com/1097470" }, { "category": "self", "summary": "SUSE Bug 1097471", "url": "https://bugzilla.suse.com/1097471" }, { "category": "self", "summary": "SUSE Bug 1097472", "url": "https://bugzilla.suse.com/1097472" }, { "category": "self", "summary": "SUSE Bug 1097551", "url": "https://bugzilla.suse.com/1097551" }, { "category": "self", "summary": "SUSE Bug 1097780", "url": "https://bugzilla.suse.com/1097780" }, { "category": "self", "summary": "SUSE Bug 1097796", "url": "https://bugzilla.suse.com/1097796" }, { "category": "self", "summary": "SUSE Bug 1097800", "url": "https://bugzilla.suse.com/1097800" }, { "category": "self", "summary": "SUSE Bug 1097941", "url": "https://bugzilla.suse.com/1097941" }, { "category": "self", "summary": "SUSE Bug 1097961", "url": "https://bugzilla.suse.com/1097961" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1098043", "url": "https://bugzilla.suse.com/1098043" }, { "category": "self", "summary": "SUSE Bug 1098050", "url": "https://bugzilla.suse.com/1098050" }, { "category": "self", "summary": "SUSE Bug 1098174", "url": "https://bugzilla.suse.com/1098174" }, { "category": "self", "summary": "SUSE Bug 1098176", "url": "https://bugzilla.suse.com/1098176" }, { "category": "self", "summary": "SUSE Bug 1098236", "url": "https://bugzilla.suse.com/1098236" }, { "category": "self", "summary": "SUSE Bug 1098401", "url": "https://bugzilla.suse.com/1098401" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098435", "url": "https://bugzilla.suse.com/1098435" }, { "category": "self", "summary": "SUSE Bug 1098599", "url": "https://bugzilla.suse.com/1098599" }, { "category": "self", "summary": "SUSE Bug 1098626", "url": "https://bugzilla.suse.com/1098626" }, { "category": "self", "summary": "SUSE Bug 1098706", "url": "https://bugzilla.suse.com/1098706" }, { "category": "self", "summary": "SUSE Bug 1098983", "url": "https://bugzilla.suse.com/1098983" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1099029", "url": "https://bugzilla.suse.com/1099029" }, { "category": "self", "summary": "SUSE Bug 1099041", "url": "https://bugzilla.suse.com/1099041" }, { "category": "self", "summary": "SUSE Bug 1099109", "url": "https://bugzilla.suse.com/1099109" }, { "category": "self", "summary": "SUSE Bug 1099142", "url": "https://bugzilla.suse.com/1099142" }, { "category": "self", "summary": "SUSE Bug 1099183", "url": "https://bugzilla.suse.com/1099183" }, { "category": "self", "summary": "SUSE Bug 1099715", "url": "https://bugzilla.suse.com/1099715" }, { "category": "self", "summary": "SUSE Bug 1099792", "url": "https://bugzilla.suse.com/1099792" }, { "category": "self", "summary": "SUSE Bug 1099918", "url": "https://bugzilla.suse.com/1099918" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099966", "url": "https://bugzilla.suse.com/1099966" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100209", "url": "https://bugzilla.suse.com/1100209" }, { "category": "self", "summary": "SUSE Bug 1100340", "url": "https://bugzilla.suse.com/1100340" }, { "category": "self", "summary": "SUSE Bug 1100362", "url": "https://bugzilla.suse.com/1100362" }, { "category": "self", "summary": "SUSE Bug 1100382", "url": "https://bugzilla.suse.com/1100382" }, { "category": "self", "summary": "SUSE Bug 1100394", "url": "https://bugzilla.suse.com/1100394" }, { "category": "self", "summary": "SUSE Bug 1100416", "url": "https://bugzilla.suse.com/1100416" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1100491", "url": "https://bugzilla.suse.com/1100491" }, { "category": "self", "summary": "SUSE Bug 1100602", "url": "https://bugzilla.suse.com/1100602" }, { "category": "self", "summary": "SUSE Bug 1100633", "url": "https://bugzilla.suse.com/1100633" }, { "category": "self", "summary": "SUSE Bug 1100843", "url": "https://bugzilla.suse.com/1100843" }, { "category": "self", "summary": "SUSE Bug 1101296", "url": "https://bugzilla.suse.com/1101296" }, { "category": "self", "summary": "SUSE Bug 1101315", "url": "https://bugzilla.suse.com/1101315" }, { "category": "self", "summary": "SUSE Bug 1101324", "url": "https://bugzilla.suse.com/1101324" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000200 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000200/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10087 page", "url": "https://www.suse.com/security/cve/CVE-2018-10087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10124 page", "url": "https://www.suse.com/security/cve/CVE-2018-10124/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1092 page", "url": "https://www.suse.com/security/cve/CVE-2018-1092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1093 page", "url": "https://www.suse.com/security/cve/CVE-2018-1093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1094 page", "url": "https://www.suse.com/security/cve/CVE-2018-1094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1120 page", "url": "https://www.suse.com/security/cve/CVE-2018-1120/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13405 page", "url": "https://www.suse.com/security/cve/CVE-2018-13405/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3639 page", "url": "https://www.suse.com/security/cve/CVE-2018-3639/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8781 page", "url": "https://www.suse.com/security/cve/CVE-2018-8781/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9385 page", "url": "https://www.suse.com/security/cve/CVE-2018-9385/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-07-27T13:37:02Z", "generator": { "date": "2018-07-27T13:37:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2092-1", "initial_release_date": "2018-07-27T13:37:02Z", "revision_history": [ { "date": "2018-07-27T13:37:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.3.1.aarch64", "product": { "name": "kernel-default-4.12.14-25.3.1.aarch64", "product_id": "kernel-default-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.3.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-25.3.1.aarch64", "product_id": "kernel-default-devel-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.3.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-25.3.1.aarch64", "product_id": "kernel-obs-build-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.3.1.aarch64", "product": { "name": "kernel-syms-4.12.14-25.3.1.aarch64", "product_id": "kernel-syms-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.3.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-25.3.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-25.3.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-25.3.1.noarch", "product": { "name": "kernel-devel-4.12.14-25.3.1.noarch", "product_id": "kernel-devel-4.12.14-25.3.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-25.3.1.noarch", "product": { "name": "kernel-macros-4.12.14-25.3.1.noarch", "product_id": "kernel-macros-4.12.14-25.3.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-25.3.1.noarch", "product": { "name": "kernel-docs-4.12.14-25.3.1.noarch", "product_id": "kernel-docs-4.12.14-25.3.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-25.3.1.noarch", "product": { "name": "kernel-source-4.12.14-25.3.1.noarch", "product_id": "kernel-source-4.12.14-25.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.3.1.ppc64le", "product": { "name": "kernel-default-4.12.14-25.3.1.ppc64le", "product_id": "kernel-default-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.3.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-25.3.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.3.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-25.3.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.3.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-25.3.1.ppc64le", "product_id": "kernel-syms-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.3.1.s390x", "product": { "name": "kernel-default-4.12.14-25.3.1.s390x", "product_id": "kernel-default-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.3.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-25.3.1.s390x", "product_id": "kernel-default-devel-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-25.3.1.s390x", "product": { "name": "kernel-default-man-4.12.14-25.3.1.s390x", "product_id": "kernel-default-man-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-25.3.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-25.3.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.3.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-25.3.1.s390x", "product_id": "kernel-obs-build-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.3.1.s390x", "product": { "name": "kernel-syms-4.12.14-25.3.1.s390x", "product_id": "kernel-syms-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.3.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-25.3.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.3.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-25.3.1.s390x", "product_id": "dlm-kmp-default-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.3.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-25.3.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-25.3.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-25.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.12.14-25.3.1.x86_64", "product": { "name": "kernel-default-4.12.14-25.3.1.x86_64", "product_id": "kernel-default-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-25.3.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-25.3.1.x86_64", "product_id": "kernel-default-devel-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-25.3.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-25.3.1.x86_64", "product_id": "kernel-obs-build-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-25.3.1.x86_64", "product": { "name": "kernel-syms-4.12.14-25.3.1.x86_64", "product_id": "kernel-syms-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-25.3.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-25.3.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-25.3.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-25.3.1.x86_64", "product_id": "kernel-default-extra-4.12.14-25.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64" }, "product_reference": "kernel-default-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x" }, "product_reference": "kernel-default-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64" }, "product_reference": "kernel-default-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch" }, "product_reference": "kernel-devel-4.12.14-25.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch" }, "product_reference": "kernel-macros-4.12.14-25.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch" }, "product_reference": "kernel-docs-4.12.14-25.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-25.3.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch" }, "product_reference": "kernel-source-4.12.14-25.3.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x" }, "product_reference": "kernel-syms-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-25.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-25.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-1000200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000200" } ], "notes": [ { "category": "general", "text": "The Linux Kernel versions 4.14, 4.15, and 4.16 has a null pointer dereference which can result in an out of memory (OOM) killing of large mlocked processes. The issue arises from an oom killed process\u0027s final thread calling exit_mmap(), which calls munlock_vma_pages_all() for mlocked vmas.This can happen synchronously with the oom reaper\u0027s unmap_page_range() since the vma\u0027s VM_LOCKED bit is cleared before munlocking (to determine if any other vmas share the memory and are mlocked).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000200", "url": "https://www.suse.com/security/cve/CVE-2018-1000200" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1000200", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090150 for CVE-2018-1000200", "url": "https://bugzilla.suse.com/1090150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-1000200" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-10087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10087" } ], "notes": [ { "category": "general", "text": "The kernel_wait4 function in kernel/exit.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service by triggering an attempted use of the -INT_MIN value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10087", "url": "https://www.suse.com/security/cve/CVE-2018-10087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089608 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1089608" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10087", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "low" } ], "title": "CVE-2018-10087" }, { "cve": "CVE-2018-10124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10124" } ], "notes": [ { "category": "general", "text": "The kill_something_info function in kernel/signal.c in the Linux kernel before 4.13, when an unspecified architecture and compiler is used, might allow local users to cause a denial of service via an INT_MIN argument.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10124", "url": "https://www.suse.com/security/cve/CVE-2018-10124" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1089752 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1089752" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-10124", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "low" } ], "title": "CVE-2018-10124" }, { "cve": "CVE-2018-1092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1092" } ], "notes": [ { "category": "general", "text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1092", "url": "https://www.suse.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "SUSE Bug 1087012 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087012" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1093" } ], "notes": [ { "category": "general", "text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1093", "url": "https://www.suse.com/security/cve/CVE-2018-1093" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087095 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087095" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1094" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1094", "url": "https://www.suse.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "SUSE Bug 1087007 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087007" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-1094" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-1120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1120" } ], "notes": [ { "category": "general", "text": "A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1120", "url": "https://www.suse.com/security/cve/CVE-2018-1120" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092100 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1092100" }, { "category": "external", "summary": "SUSE Bug 1093158 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1093158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "low" } ], "title": "CVE-2018-1120" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13405" } ], "notes": [ { "category": "general", "text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13405", "url": "https://www.suse.com/security/cve/CVE-2018-13405" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1100416 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1100416" }, { "category": "external", "summary": "SUSE Bug 1129735 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1129735" }, { "category": "external", "summary": "SUSE Bug 1195161 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1195161" }, { "category": "external", "summary": "SUSE Bug 1198702 for CVE-2018-13405", "url": "https://bugzilla.suse.com/1198702" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-13405" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-3639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3639" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3639", "url": "https://www.suse.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1085235 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085235" }, { "category": "external", "summary": "SUSE Bug 1085308 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1085308" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092631 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092631" }, { "category": "external", "summary": "SUSE Bug 1092885 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1092885" }, { "category": "external", "summary": "SUSE Bug 1094912 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1094912" }, { "category": "external", "summary": "SUSE Bug 1098813 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1098813" }, { "category": "external", "summary": "SUSE Bug 1100394 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1100394" }, { "category": "external", "summary": "SUSE Bug 1102640 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1102640" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1111963 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1111963" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172781" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172782" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1172783" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2018-3639", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-3639" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "important" } ], "title": "CVE-2018-5848" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-7492" }, { "cve": "CVE-2018-8781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8781" } ], "notes": [ { "category": "general", "text": "The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8781", "url": "https://www.suse.com/security/cve/CVE-2018-8781" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090643 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090643" }, { "category": "external", "summary": "SUSE Bug 1090646 for CVE-2018-8781", "url": "https://bugzilla.suse.com/1090646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "important" } ], "title": "CVE-2018-8781" }, { "cve": "CVE-2018-9385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9385" } ], "notes": [ { "category": "general", "text": "In driver_override_store of bus.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-74128061 References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9385", "url": "https://www.suse.com/security/cve/CVE-2018-9385" }, { "category": "external", "summary": "SUSE Bug 1100491 for CVE-2018-9385", "url": "https://bugzilla.suse.com/1100491" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-25_3-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-25.3.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-25.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-25.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-27T13:37:02Z", "details": "moderate" } ], "title": "CVE-2018-9385" } ] }
suse-su-2018:2332-1
Vulnerability from csaf_suse
Published
2018-08-15 11:17
Modified
2018-08-15 11:17
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. (bnc#1097234).
- CVE-2017-13305: A information disclosure vulnerability in the Upstream kernel encrypted-keys. (bnc#1094353).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).
The following non-security bugs were fixed:
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
Patchnames
sdksp4-kernel-201808-13728,slessp4-kernel-201808-13728,slexsp3-kernel-201808-13728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).\n- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. (bnc#1097234).\n- CVE-2017-13305: A information disclosure vulnerability in the Upstream kernel encrypted-keys. (bnc#1094353).\n- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).\n- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).\n- CVE-2018-5803: An error in the \u0027_sctp_make_chunk()\u0027 function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).\n- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)\n- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.\n- slab: introduce kmalloc_array() (bsc#909361).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/cpu/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-201808-13728,slessp4-kernel-201808-13728,slexsp3-kernel-201808-13728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2332-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2332-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182332-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2332-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004417.html" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099942", "url": "https://bugzilla.suse.com/1099942" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1104475", "url": "https://bugzilla.suse.com/1104475" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 909361", "url": "https://bugzilla.suse.com/909361" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8405 page", "url": "https://www.suse.com/security/cve/CVE-2016-8405/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-15T11:17:33Z", "generator": { "date": "2018-08-15T11:17:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2332-1", "initial_release_date": "2018-08-15T11:17:33Z", "revision_history": [ { "date": "2018-08-15T11:17:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.i586", "product": { "name": "kernel-default-3.0.101-108.68.1.i586", "product_id": "kernel-default-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.68.1.i586", "product_id": "kernel-default-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.i586", "product_id": "kernel-default-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.68.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.68.1.i586", "product_id": "kernel-ec2-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.68.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.68.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.68.1.i586", "product": { "name": "kernel-pae-3.0.101-108.68.1.i586", "product_id": "kernel-pae-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.68.1.i586", "product_id": "kernel-pae-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.68.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.i586", "product": { "name": "kernel-source-3.0.101-108.68.1.i586", "product_id": "kernel-source-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.i586", "product": { "name": "kernel-syms-3.0.101-108.68.1.i586", "product_id": "kernel-syms-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.i586", "product": { "name": "kernel-trace-3.0.101-108.68.1.i586", "product_id": "kernel-trace-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.i586", "product_id": "kernel-trace-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.68.1.i586", "product": { "name": "kernel-xen-3.0.101-108.68.1.i586", "product_id": "kernel-xen-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.68.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.68.1.i586", "product_id": "kernel-xen-base-3.0.101-108.68.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.68.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.68.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.68.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.ia64", "product": { "name": "kernel-default-3.0.101-108.68.1.ia64", "product_id": "kernel-default-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.ia64", "product": { "name": "kernel-default-base-3.0.101-108.68.1.ia64", "product_id": "kernel-default-base-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.ia64", "product_id": "kernel-default-devel-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.ia64", "product": { "name": "kernel-source-3.0.101-108.68.1.ia64", "product_id": "kernel-source-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.ia64", "product": { "name": "kernel-syms-3.0.101-108.68.1.ia64", "product_id": "kernel-syms-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.ia64", "product": { "name": "kernel-trace-3.0.101-108.68.1.ia64", "product_id": "kernel-trace-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.ia64", "product_id": "kernel-trace-base-3.0.101-108.68.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.ia64", "product_id": "kernel-trace-devel-3.0.101-108.68.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-108.68.1.noarch", "product": { "name": "kernel-docs-3.0.101-108.68.1.noarch", "product_id": "kernel-docs-3.0.101-108.68.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.68.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.68.1.ppc64", "product_id": "kernel-default-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.68.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.68.1.ppc64", "product_id": "kernel-source-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.68.1.ppc64", "product_id": "kernel-syms-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.68.1.ppc64", "product_id": "kernel-trace-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.68.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.68.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-3.0.101-108.68.1.s390x", "product_id": "kernel-default-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.68.1.s390x", "product_id": "kernel-default-base-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.68.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.68.1.s390x", "product_id": "kernel-default-man-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.s390x", "product": { "name": "kernel-source-3.0.101-108.68.1.s390x", "product_id": "kernel-source-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.68.1.s390x", "product_id": "kernel-syms-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.68.1.s390x", "product_id": "kernel-trace-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.68.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.68.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.68.1.x86_64", "product_id": "kernel-default-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.68.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.68.1.x86_64", "product_id": "kernel-source-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.68.1.x86_64", "product_id": "kernel-syms-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.68.1.x86_64", "product_id": "kernel-trace-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.68.1.x86_64", "product_id": "kernel-xen-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.68.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.68.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-108.68.1.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" }, "product_reference": "kernel-docs-3.0.101-108.68.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586" }, "product_reference": "kernel-source-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586" }, "product_reference": "kernel-source-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8405" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8405", "url": "https://www.suse.com/security/cve/CVE-2016-8405" }, { "category": "external", "summary": "SUSE Bug 1099942 for CVE-2016-8405", "url": "https://bugzilla.suse.com/1099942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2016-8405" }, { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-108.68.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-108.68.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-08-15T11:17:33Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:1855-1
Vulnerability from csaf_suse
Published
2018-06-29 14:41
Modified
2018-06-29 14:41
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
ioctl (bsc#1096728).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
nid, which allowed local users to cause a denial of service (race condition) or
possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
registers) between processes. These registers might contain encryption keys
when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
option that triggers a NULL value for a flush_cmd_control data structure
(bnc#1086400)
- CVE-2017-13305: Prevent information disclosure vulnerability in
encrypted-keys (bsc#1094353).
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
cause a denial of service (out-of-bounds read and system crash) via a crafted
ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers
(bsc#1087095).
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
crc32c checksum driver, which allowed attackers to cause a denial of service
(ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
ext4 image (bsc#1087007).
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
with a zero i_links_count, which allowed attackers to cause a denial of service
(ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
image (bsc#1087012).
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bsc#1092904).
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
that contains a jump but lacks a user-defined chain, which allowed local users
to cause a denial of service (NULL pointer dereference) by leveraging the
CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
handling SCTP packets length that could have been exploited to cause a kernel
crash (bnc#1083900).
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
__rds_rdma_map() function that allowed local attackers to cause a system panic
and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
(bsc#1082962).
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
could have caused a crash and possibly memory corruption (bsc#1089895).
The following non-security bugs were fixed:
- ALSA: timer: Fix pause event notification (bsc#973378).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fix the patch content (bsc#1085185)
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
Patchnames
SUSE-OpenStack-Cloud-7-2018-1251,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1251,SUSE-SLE-SAP-12-SP2-2018-1251,SUSE-SLE-SERVER-12-SP2-2018-1251,SUSE-Storage-4-2018-1251
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO\n ioctl (bsc#1096728).\n- CVE-2017-18249: The add_free_nid function did not properly track an allocated\n nid, which allowed local users to cause a denial of service (race condition) or\n possibly have unspecified other impact via concurrent threads (bnc#1087036)\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge\n option that triggers a NULL value for a flush_cmd_control data structure\n (bnc#1086400)\n- CVE-2017-13305: Prevent information disclosure vulnerability in\n encrypted-keys (bsc#1094353).\n- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to\n cause a denial of service (out-of-bounds read and system crash) via a crafted\n ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers\n (bsc#1087095).\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007).\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012).\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904).\n- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob\n that contains a jump but lacks a user-defined chain, which allowed local users\n to cause a denial of service (NULL pointer dereference) by leveraging the\n CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900).\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962).\n- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that\n could have caused a crash and possibly memory corruption (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ALSA: timer: Fix pause event notification (bsc#973378).\n- Fix excessive newline in /proc/*/status (bsc#1094823).\n- Fix the patch content (bsc#1085185)\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).\n- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).\n- x86/bugs: Respect retpoline command line option (bsc#1068032).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-OpenStack-Cloud-7-2018-1251,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2018-1251,SUSE-SLE-SAP-12-SP2-2018-1251,SUSE-SLE-SERVER-12-SP2-2018-1251,SUSE-Storage-4-2018-1251", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1855-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1855-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181855-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1855-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004236.html" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083650", "url": "https://bugzilla.suse.com/1083650" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1086400", "url": "https://bugzilla.suse.com/1086400" }, { "category": "self", "summary": "SUSE Bug 1087007", "url": "https://bugzilla.suse.com/1087007" }, { "category": "self", "summary": "SUSE Bug 1087012", "url": "https://bugzilla.suse.com/1087012" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1087086", "url": "https://bugzilla.suse.com/1087086" }, { "category": "self", "summary": "SUSE Bug 1087095", "url": "https://bugzilla.suse.com/1087095" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090534", "url": "https://bugzilla.suse.com/1090534" }, { "category": "self", "summary": "SUSE Bug 1090955", "url": "https://bugzilla.suse.com/1090955" }, { "category": "self", "summary": "SUSE Bug 1092497", "url": "https://bugzilla.suse.com/1092497" }, { "category": "self", "summary": "SUSE Bug 1092552", "url": "https://bugzilla.suse.com/1092552" }, { "category": "self", "summary": "SUSE Bug 1092813", "url": "https://bugzilla.suse.com/1092813" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094033", "url": "https://bugzilla.suse.com/1094033" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1095042", "url": "https://bugzilla.suse.com/1095042" }, { "category": "self", "summary": "SUSE Bug 1096140", "url": "https://bugzilla.suse.com/1096140" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18241 page", "url": "https://www.suse.com/security/cve/CVE-2017-18241/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1065 page", "url": "https://www.suse.com/security/cve/CVE-2018-1065/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1092 page", "url": "https://www.suse.com/security/cve/CVE-2018-1092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1093 page", "url": "https://www.suse.com/security/cve/CVE-2018-1093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1094 page", "url": "https://www.suse.com/security/cve/CVE-2018-1094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-06-29T14:41:33Z", "generator": { "date": "2018-06-29T14:41:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1855-1", "initial_release_date": "2018-06-29T14:41:33Z", "revision_history": [ { "date": "2018-06-29T14:41:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.85.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.85.1.noarch", "product_id": "kernel-devel-4.4.121-92.85.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.85.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.85.1.noarch", "product_id": "kernel-macros-4.4.121-92.85.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.85.1.noarch", "product": { "name": "kernel-source-4.4.121-92.85.1.noarch", "product_id": "kernel-source-4.4.121-92.85.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.85.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.85.1.ppc64le", "product_id": "kernel-default-4.4.121-92.85.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.85.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.85.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.85.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.85.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.85.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.85.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.85.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.85.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.85.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.85.1.s390x", "product": { "name": "kernel-default-4.4.121-92.85.1.s390x", "product_id": "kernel-default-4.4.121-92.85.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.85.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.85.1.s390x", "product_id": "kernel-default-base-4.4.121-92.85.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.85.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.85.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.85.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.85.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.85.1.s390x", "product_id": "kernel-default-man-4.4.121-92.85.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.85.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.85.1.s390x", "product_id": "kernel-syms-4.4.121-92.85.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.85.1.x86_64", "product_id": "kernel-default-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.85.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.85.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.85.1.x86_64", "product_id": "kernel-syms-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.85.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.85.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.85.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.85.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.85.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.85.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.85.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.85.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.85.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2017-18241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18241" } ], "notes": [ { "category": "general", "text": "fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18241", "url": "https://www.suse.com/security/cve/CVE-2017-18241" }, { "category": "external", "summary": "SUSE Bug 1086400 for CVE-2017-18241", "url": "https://bugzilla.suse.com/1086400" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1065" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1065", "url": "https://www.suse.com/security/cve/CVE-2018-1065" }, { "category": "external", "summary": "SUSE Bug 1083650 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1083650" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1092" } ], "notes": [ { "category": "general", "text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1092", "url": "https://www.suse.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "SUSE Bug 1087012 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087012" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1093" } ], "notes": [ { "category": "general", "text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1093", "url": "https://www.suse.com/security/cve/CVE-2018-1093" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087095 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087095" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1094" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1094", "url": "https://www.suse.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "SUSE Bug 1087007 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087007" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-1094" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "important" } ], "title": "CVE-2018-5848" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.85.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.85.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-29T14:41:33Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:2366-1
Vulnerability from csaf_suse
Published
2018-08-16 07:07
Modified
2018-08-16 07:07
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability existed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).
- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).
- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).
The following non-security bugs were fixed:
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- slab: introduce kmalloc_array() (bsc#909361).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
Patchnames
sleposp3-kernel-20180809-13731,slessp3-kernel-20180809-13731,slexsp3-kernel-20180809-13731
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).\n- CVE-2017-13305: A information disclosure vulnerability existed in the encrypted-keys handling. (bnc#1094353).\n- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device could lead to a local kernel information leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).\n- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).\n- CVE-2018-1130: A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).\n- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c kernel could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 1100418).\n- CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081).\n- CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343).\n- CVE-2018-5803: An error in the \u0027_sctp_make_chunk()\u0027 function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations could be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- disable-prot_none_mitigation.patch: disable prot_none native mitigation (bnc#1104684)\n- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.\n- slab: introduce kmalloc_array() (bsc#909361).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleposp3-kernel-20180809-13731,slessp3-kernel-20180809-13731,slexsp3-kernel-20180809-13731", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2366-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2366-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182366-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2366-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-August/004445.html" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099942", "url": "https://bugzilla.suse.com/1099942" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1104475", "url": "https://bugzilla.suse.com/1104475" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 909361", "url": "https://bugzilla.suse.com/909361" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8405 page", "url": "https://www.suse.com/security/cve/CVE-2016-8405/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-08-16T07:07:31Z", "generator": { "date": "2018-08-16T07:07:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2366-1", "initial_release_date": "2018-08-16T07:07:31Z", "revision_history": [ { "date": "2018-08-16T07:07:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-default-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-pae-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-source-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-syms-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-trace-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-xen-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.106.43.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-source-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8405" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8405", "url": "https://www.suse.com/security/cve/CVE-2016-8405" }, { "category": "external", "summary": "SUSE Bug 1099942 for CVE-2016-8405", "url": "https://bugzilla.suse.com/1099942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2016-8405" }, { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.106.43.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.106.43.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-08-16T07:07:31Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:1855-2
Vulnerability from csaf_suse
Published
2018-10-18 12:47
Modified
2018-10-18 12:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did
not handle unsigned integer overflow properly. As a result, a large value of
the 'ie_len' argument could have caused a buffer overflow (bnc#1097356)
- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO
ioctl (bsc#1096728).
- CVE-2017-18249: The add_free_nid function did not properly track an allocated
nid, which allowed local users to cause a denial of service (race condition) or
possibly have unspecified other impact via concurrent threads (bnc#1087036)
- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX
registers) between processes. These registers might contain encryption keys
when doing SSE accelerated AES enc/decryption (bsc#1087086)
- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge
option that triggers a NULL value for a flush_cmd_control data structure
(bnc#1086400)
- CVE-2017-13305: Prevent information disclosure vulnerability in
encrypted-keys (bsc#1094353).
- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to
cause a denial of service (out-of-bounds read and system crash) via a crafted
ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers
(bsc#1087095).
- CVE-2018-1094: The ext4_fill_super function did not always initialize the
crc32c checksum driver, which allowed attackers to cause a denial of service
(ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted
ext4 image (bsc#1087007).
- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory
with a zero i_links_count, which allowed attackers to cause a denial of service
(ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4
image (bsc#1087012).
- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that
allowed a local user to cause a denial of service by a number of certain
crafted system calls (bsc#1092904).
- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob
that contains a jump but lacks a user-defined chain, which allowed local users
to cause a denial of service (NULL pointer dereference) by leveraging the
CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).
- CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when
handling SCTP packets length that could have been exploited to cause a kernel
crash (bnc#1083900).
- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c
__rds_rdma_map() function that allowed local attackers to cause a system panic
and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST
(bsc#1082962).
- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that
could have caused a crash and possibly memory corruption (bsc#1089895).
The following non-security bugs were fixed:
- ALSA: timer: Fix pause event notification (bsc#973378).
- Fix excessive newline in /proc/*/status (bsc#1094823).
- Fix the patch content (bsc#1085185)
- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).
- ipv6: omit traffic class when calculating flow hash (bsc#1095042).
- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).
- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).
- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).
- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).
- x86/bugs: Respect retpoline command line option (bsc#1068032).
- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).
- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).
- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)
- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).
- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).
- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).
Patchnames
SUSE-SLE-SERVER-12-SP2-BCL-2018-1251
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-5848: In the function wmi_set_ie(), the length validation code did\n not handle unsigned integer overflow properly. As a result, a large value of\n the \u0027ie_len\u0027 argument could have caused a buffer overflow (bnc#1097356)\n- CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO\n ioctl (bsc#1096728).\n- CVE-2017-18249: The add_free_nid function did not properly track an allocated\n nid, which allowed local users to cause a denial of service (race condition) or\n possibly have unspecified other impact via concurrent threads (bnc#1087036)\n- CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX\n registers) between processes. These registers might contain encryption keys\n when doing SSE accelerated AES enc/decryption (bsc#1087086)\n- CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge\n option that triggers a NULL value for a flush_cmd_control data structure\n (bnc#1086400)\n- CVE-2017-13305: Prevent information disclosure vulnerability in\n encrypted-keys (bsc#1094353).\n- CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to\n cause a denial of service (out-of-bounds read and system crash) via a crafted\n ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers\n (bsc#1087095).\n- CVE-2018-1094: The ext4_fill_super function did not always initialize the\n crc32c checksum driver, which allowed attackers to cause a denial of service\n (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted\n ext4 image (bsc#1087007).\n- CVE-2018-1092: The ext4_iget function mishandled the case of a root directory\n with a zero i_links_count, which allowed attackers to cause a denial of service\n (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4\n image (bsc#1087012).\n- CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that\n allowed a local user to cause a denial of service by a number of certain\n crafted system calls (bsc#1092904).\n- CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob\n that contains a jump but lacks a user-defined chain, which allowed local users\n to cause a denial of service (NULL pointer dereference) by leveraging the\n CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650).\n- CVE-2018-5803: Prevent error in the \u0027_sctp_make_chunk()\u0027 function when\n handling SCTP packets length that could have been exploited to cause a kernel\n crash (bnc#1083900).\n- CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c\n __rds_rdma_map() function that allowed local attackers to cause a system panic\n and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST\n (bsc#1082962).\n- CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that\n could have caused a crash and possibly memory corruption (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ALSA: timer: Fix pause event notification (bsc#973378).\n- Fix excessive newline in /proc/*/status (bsc#1094823).\n- Fix the patch content (bsc#1085185)\n- KVM: x86: Sync back MSR_IA32_SPEC_CTRL to VCPU data structure (bsc#1096242, bsc#1096281).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- ipv6: add mtu lock check in __ip6_rt_update_pmtu (bsc#1092552).\n- ipv6: omit traffic class when calculating flow hash (bsc#1095042).\n- kgraft/bnx2fc: Do not block kGraft in bnx2fc_l2_rcv kthread (bsc#1094033).\n- mm, page_alloc: do not break __GFP_THISNODE by zonelist reset (bsc#1079152, VM Functionality).\n- x86/boot: Fix early command-line parsing when partial word matches (bsc#1096140).\n- x86/bugs: IBRS: make runtime disabling fully dynamic (bsc#1096281).\n- x86/bugs: Respect retpoline command line option (bsc#1068032).\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1092497).\n- x86/bugs: spec_ctrl must be cleared from cpu_caps_set when being disabled (bsc#1096140).\n- x86/kaiser: export symbol kaiser_set_shadow_pgd() (bsc#1092813)\n- xfs: convert XFS_AGFL_SIZE to a helper function (bsc#1090955, bsc#1090534).\n- xfs: detect agfl count corruption and reset agfl (bsc#1090955, bsc#1090534).\n- xfs: do not log/recover swapext extent owner changes for deleted inodes (bsc#1090955).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP2-BCL-2018-1251", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1855-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1855-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181855-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1855-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004702.html" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1079152", "url": "https://bugzilla.suse.com/1079152" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083650", "url": "https://bugzilla.suse.com/1083650" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085185", "url": "https://bugzilla.suse.com/1085185" }, { "category": "self", "summary": "SUSE Bug 1086400", "url": "https://bugzilla.suse.com/1086400" }, { "category": "self", "summary": "SUSE Bug 1087007", "url": "https://bugzilla.suse.com/1087007" }, { "category": "self", "summary": "SUSE Bug 1087012", "url": "https://bugzilla.suse.com/1087012" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1087086", "url": "https://bugzilla.suse.com/1087086" }, { "category": "self", "summary": "SUSE Bug 1087095", "url": "https://bugzilla.suse.com/1087095" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090534", "url": "https://bugzilla.suse.com/1090534" }, { "category": "self", "summary": "SUSE Bug 1090955", "url": "https://bugzilla.suse.com/1090955" }, { "category": "self", "summary": "SUSE Bug 1092497", "url": "https://bugzilla.suse.com/1092497" }, { "category": "self", "summary": "SUSE Bug 1092552", "url": "https://bugzilla.suse.com/1092552" }, { "category": "self", "summary": "SUSE Bug 1092813", "url": "https://bugzilla.suse.com/1092813" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1094033", "url": "https://bugzilla.suse.com/1094033" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1095042", "url": "https://bugzilla.suse.com/1095042" }, { "category": "self", "summary": "SUSE Bug 1096140", "url": "https://bugzilla.suse.com/1096140" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097356", "url": "https://bugzilla.suse.com/1097356" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18241 page", "url": "https://www.suse.com/security/cve/CVE-2017-18241/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1065 page", "url": "https://www.suse.com/security/cve/CVE-2018-1065/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1092 page", "url": "https://www.suse.com/security/cve/CVE-2018-1092/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1093 page", "url": "https://www.suse.com/security/cve/CVE-2018-1093/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1094 page", "url": "https://www.suse.com/security/cve/CVE-2018-1094/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3665 page", "url": "https://www.suse.com/security/cve/CVE-2018-3665/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5848 page", "url": "https://www.suse.com/security/cve/CVE-2018-5848/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-10-18T12:47:06Z", "generator": { "date": "2018-10-18T12:47:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1855-2", "initial_release_date": "2018-10-18T12:47:06Z", "revision_history": [ { "date": "2018-10-18T12:47:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.85.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.85.1.noarch", "product_id": "kernel-devel-4.4.121-92.85.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.85.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.85.1.noarch", "product_id": "kernel-macros-4.4.121-92.85.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.85.1.noarch", "product": { "name": "kernel-source-4.4.121-92.85.1.noarch", "product_id": "kernel-source-4.4.121-92.85.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.85.1.x86_64", "product_id": "kernel-default-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.85.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.85.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.85.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.85.1.x86_64", "product_id": "kernel-syms-4.4.121-92.85.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.85.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.85.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.85.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.85.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2017-18241", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18241" } ], "notes": [ { "category": "general", "text": "fs/f2fs/segment.c in the Linux kernel before 4.13 allows local users to cause a denial of service (NULL pointer dereference and panic) by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18241", "url": "https://www.suse.com/security/cve/CVE-2017-18241" }, { "category": "external", "summary": "SUSE Bug 1086400 for CVE-2017-18241", "url": "https://bugzilla.suse.com/1086400" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1065", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1065" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.15.7 mishandles the case of a rule blob that contains a jump but lacks a user-defined chain, which allows local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability, related to arpt_do_table in net/ipv4/netfilter/arp_tables.c, ipt_do_table in net/ipv4/netfilter/ip_tables.c, and ip6t_do_table in net/ipv6/netfilter/ip6_tables.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1065", "url": "https://www.suse.com/security/cve/CVE-2018-1065" }, { "category": "external", "summary": "SUSE Bug 1083650 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1083650" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1065", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1092", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1092" } ], "notes": [ { "category": "general", "text": "The ext4_iget function in fs/ext4/inode.c in the Linux kernel through 4.15.15 mishandles the case of a root directory with a zero i_links_count, which allows attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1092", "url": "https://www.suse.com/security/cve/CVE-2018-1092" }, { "category": "external", "summary": "SUSE Bug 1087012 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087012" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1092", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1093" } ], "notes": [ { "category": "general", "text": "The ext4_valid_block_bitmap function in fs/ext4/balloc.c in the Linux kernel through 4.15.15 allows attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1093", "url": "https://www.suse.com/security/cve/CVE-2018-1093" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087095 for CVE-2018-1093", "url": "https://bugzilla.suse.com/1087095" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1094", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1094" } ], "notes": [ { "category": "general", "text": "The ext4_fill_super function in fs/ext4/super.c in the Linux kernel through 4.15.15 does not always initialize the crc32c checksum driver, which allows attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1094", "url": "https://www.suse.com/security/cve/CVE-2018-1094" }, { "category": "external", "summary": "SUSE Bug 1087007 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087007" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1094", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-1094" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-3665", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3665" } ], "notes": [ { "category": "general", "text": "System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3665", "url": "https://www.suse.com/security/cve/CVE-2018-3665" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1087086 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1087086" }, { "category": "external", "summary": "SUSE Bug 1090338 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1090338" }, { "category": "external", "summary": "SUSE Bug 1095241 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095241" }, { "category": "external", "summary": "SUSE Bug 1095242 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1095242" }, { "category": "external", "summary": "SUSE Bug 1096740 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1096740" }, { "category": "external", "summary": "SUSE Bug 1100091 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100091" }, { "category": "external", "summary": "SUSE Bug 1100555 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1100555" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3665", "url": "https://bugzilla.suse.com/1178658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-3665" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5848" } ], "notes": [ { "category": "general", "text": "In the function wmi_set_ie(), the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the \u0027ie_len\u0027 argument can cause a buffer overflow in all Android releases from CAF (Android for MSM, Firefox OS for MSM, QRD Android) using the Linux Kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5848", "url": "https://www.suse.com/security/cve/CVE-2018-5848" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097356 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1097356" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1105412" }, { "category": "external", "summary": "SUSE Bug 1115339 for CVE-2018-5848", "url": "https://bugzilla.suse.com/1115339" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "important" } ], "title": "CVE-2018-5848" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.85.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.85.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kgraft-patch-4_4_121-92_85-default-1-3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-18T12:47:06Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
suse-su-2018:2637-1
Vulnerability from csaf_suse
Published
2018-09-06 13:01
Modified
2018-09-06 13:01
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).
- CVE-2017-13305: A information disclosure vulnerability was fixed in the encrypted-keys handling. (bnc#1094353).
- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device lead to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).
- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).
- CVE-2018-1130: Linux kernel was vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).
- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS could be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).
- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).
- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).
- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).
- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).
- CVE-2018-5803: An error in the '_sctp_make_chunk()' function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).
- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).
- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).
The following non-security bugs were fixed:
- usb: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).
- usb: hub: fix non-SS hub-descriptor handling (bsc#1047487).
- usb: kobil_sct: fix non-atomic allocation in write path (bsc#1015828).
- usb: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).
- usb: serial: io_edgeport: fix NULL-deref at open (bsc#1015828).
- usb: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).
- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132).
- usb: visor: Match I330 phone more precisely (bsc#1047487).
- cpu/hotplug: Add sysfs state interface (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).
- cpu/hotplug: Split do_cpu_down() (bsc#1089343).
- disable prot_none native mitigation (bnc#1104684)
- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).
- drm: re-enable error handling (bsc#1103884)
- efivarfs: maintain the efivarfs interfaces when sysfs be created and removed (bsc#1097125).
- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.
- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).
- nvme: add device id's with intel stripe quirk (bsc#1097562).
- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).
- perf/x86/intel: Handle Broadwell family processors (bsc#1093183).
- s390/qeth: fix IPA command submission race (bnc#1099709, LTC#169004).
- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1102087, LTC#168038).
- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bnc#1102087, LTC#168765).
- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bnc#1102087, LTC#168765).
- series.conf: Remove trailing whitespaces
- slab: introduce kmalloc_array() (bsc#909361).
- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).
- x64/entry: move ENABLE_IBRS after switching from trampoline stack (bsc#1098658).
- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).
- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).
- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).
- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).
- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- x86/fpu: fix signal handling with eager FPU switching (bsc#1100091).
- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).
- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).
- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).
- x86/topology: Add topology_max_smt_threads() (bsc#1089343).
- x86/topology: Provide topology_smt_supported() (bsc#1089343).
- x86/traps: Fix bad_iret_stack in fixup_bad_iret() (bsc#1098658).
- x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).
- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).
- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).
- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).
- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132).
Patchnames
slertesp4-kernel-rt-20180827-13770
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2016-8405: An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. (bnc#1099942).\n- CVE-2017-13305: A information disclosure vulnerability was fixed in the encrypted-keys handling. (bnc#1094353).\n- CVE-2018-1000204: A malformed SG_IO ioctl issued for a SCSI device lead to a local kernel data leak manifesting in up to approximately 1000 memory pages copied to the userspace. The problem has limited scope as non-privileged users usually have no permissions to access SCSI device files. (bnc#1096728).\n- CVE-2018-1068: A flaw was found in the implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory (bnc#1085107).\n- CVE-2018-1130: Linux kernel was vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allowed a local user to cause a denial of service by a number of certain crafted system calls (bnc#1092904).\n- CVE-2018-12233: In the ea_get function in fs/jfs/xattr.c a memory corruption bug in JFS could be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr (bnc#1097234).\n- CVE-2018-13053: The alarm_timer_nsleep function in kernel/time/alarmtimer.c had an integer overflow via a large relative timeout because ktime_add_safe is not used (bnc#1099924).\n- CVE-2018-13406: An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1098016 bnc#1100418).\n- CVE-2018-3620: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis (bnc#1087081).\n- CVE-2018-3646: Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis (bnc#1089343 bnc#1104365).\n- CVE-2018-5803: An error in the \u0027_sctp_make_chunk()\u0027 function (net/sctp/sm_make_chunk.c) when handling SCTP packets length could be exploited to cause a kernel crash (bnc#1083900).\n- CVE-2018-5814: Multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets (bnc#1096480).\n- CVE-2018-7492: A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bnc#1082962).\n\nThe following non-security bugs were fixed:\n\n- usb: add USB_DEVICE_INTERFACE_CLASS macro (bsc#1047487).\n- usb: hub: fix non-SS hub-descriptor handling (bsc#1047487).\n- usb: kobil_sct: fix non-atomic allocation in write path (bsc#1015828).\n- usb: serial: ftdi_sio: fix latency-timer error handling (bsc#1037441).\n- usb: serial: io_edgeport: fix NULL-deref at open (bsc#1015828).\n- usb: serial: io_edgeport: fix possible sleep-in-atomic (bsc#1037441).\n- usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132).\n- usb: visor: Match I330 phone more precisely (bsc#1047487).\n- cpu/hotplug: Add sysfs state interface (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Provide knobs to control SMT (bsc#1089343).\n- cpu/hotplug: Split do_cpu_down() (bsc#1089343).\n- disable prot_none native mitigation (bnc#1104684)\n- drm/i915: fix use-after-free in page_flip_completed() (bsc#1103909).\n- drm: re-enable error handling (bsc#1103884)\n- efivarfs: maintain the efivarfs interfaces when sysfs be created and removed (bsc#1097125).\n- fix pgd underflow (bnc#1104475) custom walk_page_range rework was incorrect and could underflow pgd if the given range was below a first vma.\n- kthread, tracing: Do not expose half-written comm when creating kthreads (Git-fixes).\n- nvme: add device id\u0027s with intel stripe quirk (bsc#1097562).\n- perf/core: Fix group scheduling with mixed hw and sw events (Git-fixes).\n- perf/x86/intel: Handle Broadwell family processors (bsc#1093183).\n- s390/qeth: fix IPA command submission race (bnc#1099709, LTC#169004).\n- scsi: zfcp: fix infinite iteration on ERP ready list (bnc#1102087, LTC#168038).\n- scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bnc#1102087, LTC#168765).\n- scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bnc#1102087, LTC#168765).\n- series.conf: Remove trailing whitespaces\n- slab: introduce kmalloc_array() (bsc#909361).\n- smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1100132).\n- x64/entry: move ENABLE_IBRS after switching from trampoline stack (bsc#1098658).\n- x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info (bsc#1089343).\n- x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings (bsc#1089343).\n- x86/apic: Ignore secondary threads if nosmt=force (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/AMD: Remove the pointless detect_ht() call (bsc#1089343).\n- x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- x86/cpu/intel: Evaluate smp_num_siblings early (bsc#1089343).\n- x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- x86/fpu: fix signal handling with eager FPU switching (bsc#1100091).\n- x86/mm: Simplify p[g4um]d_page() macros (bnc#1087081, bnc#1104684).\n- x86/smp: Provide topology_is_primary_thread() (bsc#1089343).\n- x86/smpboot: Do not use smp_num_siblings in __max_logical_packages calculation (bsc#1089343).\n- x86/topology: Add topology_max_smt_threads() (bsc#1089343).\n- x86/topology: Provide topology_smt_supported() (bsc#1089343).\n- x86/traps: Fix bad_iret_stack in fixup_bad_iret() (bsc#1098658).\n- x86/traps: add missing kernel CR3 switch in bad_iret path (bsc#1098658).\n- xen/x86/cpu/common: Provide detect_ht_early() (bsc#1089343).\n- xen/x86/cpu/topology: Provide detect_extended_topology_early() (bsc#1089343).\n- xen/x86/cpu: Remove the pointless CPU printout (bsc#1089343).\n- xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-rt-20180827-13770", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2637-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2637-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182637-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2637-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-September/004537.html" }, { "category": "self", "summary": "SUSE Bug 1015828", "url": "https://bugzilla.suse.com/1015828" }, { "category": "self", "summary": "SUSE Bug 1037441", "url": "https://bugzilla.suse.com/1037441" }, { "category": "self", "summary": "SUSE Bug 1047487", "url": "https://bugzilla.suse.com/1047487" }, { "category": "self", "summary": "SUSE Bug 1082962", "url": "https://bugzilla.suse.com/1082962" }, { "category": "self", "summary": "SUSE Bug 1083900", "url": "https://bugzilla.suse.com/1083900" }, { "category": "self", "summary": "SUSE Bug 1085107", "url": "https://bugzilla.suse.com/1085107" }, { "category": "self", "summary": "SUSE Bug 1087081", "url": "https://bugzilla.suse.com/1087081" }, { "category": "self", "summary": "SUSE Bug 1089343", "url": "https://bugzilla.suse.com/1089343" }, { "category": "self", "summary": "SUSE Bug 1092904", "url": "https://bugzilla.suse.com/1092904" }, { "category": "self", "summary": "SUSE Bug 1093183", "url": "https://bugzilla.suse.com/1093183" }, { "category": "self", "summary": "SUSE Bug 1094353", "url": "https://bugzilla.suse.com/1094353" }, { "category": "self", "summary": "SUSE Bug 1096480", "url": "https://bugzilla.suse.com/1096480" }, { "category": "self", "summary": "SUSE Bug 1096728", "url": "https://bugzilla.suse.com/1096728" }, { "category": "self", "summary": "SUSE Bug 1097125", "url": "https://bugzilla.suse.com/1097125" }, { "category": "self", "summary": "SUSE Bug 1097234", "url": "https://bugzilla.suse.com/1097234" }, { "category": "self", "summary": "SUSE Bug 1097562", "url": "https://bugzilla.suse.com/1097562" }, { "category": "self", "summary": "SUSE Bug 1098016", "url": "https://bugzilla.suse.com/1098016" }, { "category": "self", "summary": "SUSE Bug 1098658", "url": "https://bugzilla.suse.com/1098658" }, { "category": "self", "summary": "SUSE Bug 1099709", "url": "https://bugzilla.suse.com/1099709" }, { "category": "self", "summary": "SUSE Bug 1099924", "url": "https://bugzilla.suse.com/1099924" }, { "category": "self", "summary": "SUSE Bug 1099942", "url": "https://bugzilla.suse.com/1099942" }, { "category": "self", "summary": "SUSE Bug 1100091", "url": "https://bugzilla.suse.com/1100091" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1100418", "url": "https://bugzilla.suse.com/1100418" }, { "category": "self", "summary": "SUSE Bug 1102087", "url": "https://bugzilla.suse.com/1102087" }, { "category": "self", "summary": "SUSE Bug 1103884", "url": "https://bugzilla.suse.com/1103884" }, { "category": "self", "summary": "SUSE Bug 1103909", "url": "https://bugzilla.suse.com/1103909" }, { "category": "self", "summary": "SUSE Bug 1104365", "url": "https://bugzilla.suse.com/1104365" }, { "category": "self", "summary": "SUSE Bug 1104475", "url": "https://bugzilla.suse.com/1104475" }, { "category": "self", "summary": "SUSE Bug 1104684", "url": "https://bugzilla.suse.com/1104684" }, { "category": "self", "summary": "SUSE Bug 909361", "url": "https://bugzilla.suse.com/909361" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8405 page", "url": "https://www.suse.com/security/cve/CVE-2016-8405/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13305 page", "url": "https://www.suse.com/security/cve/CVE-2017-13305/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000204 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000204/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1130 page", "url": "https://www.suse.com/security/cve/CVE-2018-1130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12233 page", "url": "https://www.suse.com/security/cve/CVE-2018-12233/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13406 page", "url": "https://www.suse.com/security/cve/CVE-2018-13406/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3620 page", "url": "https://www.suse.com/security/cve/CVE-2018-3620/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-3646 page", "url": "https://www.suse.com/security/cve/CVE-2018-3646/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5803 page", "url": "https://www.suse.com/security/cve/CVE-2018-5803/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5814 page", "url": "https://www.suse.com/security/cve/CVE-2018-5814/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-7492 page", "url": "https://www.suse.com/security/cve/CVE-2018-7492/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2018-09-06T13:01:35Z", "generator": { "date": "2018-09-06T13:01:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2637-1", "initial_release_date": "2018-09-06T13:01:35Z", "revision_history": [ { "date": "2018-09-06T13:01:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8405", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8405" } ], "notes": [ { "category": "general", "text": "An information disclosure vulnerability in kernel components including the ION subsystem, Binder, USB driver and networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31651010.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8405", "url": "https://www.suse.com/security/cve/CVE-2016-8405" }, { "category": "external", "summary": "SUSE Bug 1099942 for CVE-2016-8405", "url": "https://bugzilla.suse.com/1099942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2016-8405" }, { "cve": "CVE-2017-13305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13305" } ], "notes": [ { "category": "general", "text": "A information disclosure vulnerability in the Upstream kernel encrypted-keys. Product: Android. Versions: Android kernel. Android ID: A-70526974.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13305", "url": "https://www.suse.com/security/cve/CVE-2017-13305" }, { "category": "external", "summary": "SUSE Bug 1094353 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1094353" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2017-13305", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "low" } ], "title": "CVE-2017-13305" }, { "cve": "CVE-2018-1000204", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000204" } ], "notes": [ { "category": "general", "text": "** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don\u0027t usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it \"virtually impossible to exploit.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000204", "url": "https://www.suse.com/security/cve/CVE-2018-1000204" }, { "category": "external", "summary": "SUSE Bug 1096728 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1096728" }, { "category": "external", "summary": "SUSE Bug 1105412 for CVE-2018-1000204", "url": "https://bugzilla.suse.com/1105412" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-1000204" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1130" } ], "notes": [ { "category": "general", "text": "Linux kernel before version 4.16-rc7 is vulnerable to a null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in that allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1130", "url": "https://www.suse.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2018-1130", "url": "https://bugzilla.suse.com/1092904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-1130" }, { "cve": "CVE-2018-12233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12233" } ], "notes": [ { "category": "general", "text": "In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12233", "url": "https://www.suse.com/security/cve/CVE-2018-12233" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097234 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1097234" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-12233", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-12233" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-13406", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13406" } ], "notes": [ { "category": "general", "text": "An integer overflow in the uvesafb_setcmap function in drivers/video/fbdev/uvesafb.c in the Linux kernel before 4.17.4 could result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13406", "url": "https://www.suse.com/security/cve/CVE-2018-13406" }, { "category": "external", "summary": "SUSE Bug 1098016 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1098016" }, { "category": "external", "summary": "SUSE Bug 1100418 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1100418" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13406", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-13406" }, { "cve": "CVE-2018-3620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3620" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3620", "url": "https://www.suse.com/security/cve/CVE-2018-3620" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1090340 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1090340" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3620", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-3620" }, { "cve": "CVE-2018-3646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-3646" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-3646", "url": "https://www.suse.com/security/cve/CVE-2018-3646" }, { "category": "external", "summary": "SUSE Bug 1087078 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087078" }, { "category": "external", "summary": "SUSE Bug 1087081 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1087081" }, { "category": "external", "summary": "SUSE Bug 1089343 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1089343" }, { "category": "external", "summary": "SUSE Bug 1091107 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1091107" }, { "category": "external", "summary": "SUSE Bug 1099306 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1099306" }, { "category": "external", "summary": "SUSE Bug 1104365 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104365" }, { "category": "external", "summary": "SUSE Bug 1104894 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1104894" }, { "category": "external", "summary": "SUSE Bug 1106548 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1106548" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-3646", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "important" } ], "title": "CVE-2018-3646" }, { "cve": "CVE-2018-5803", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5803" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5803", "url": "https://www.suse.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "SUSE Bug 1083900 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1083900" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5803", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-5803" }, { "cve": "CVE-2018-5814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5814" } ], "notes": [ { "category": "general", "text": "In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5814", "url": "https://www.suse.com/security/cve/CVE-2018-5814" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1096480 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1096480" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2018-5814", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-5814" }, { "cve": "CVE-2018-7492", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-7492" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference was found in the net/rds/rdma.c __rds_rdma_map() function in the Linux kernel before 4.14.7 allowing local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-7492", "url": "https://www.suse.com/security/cve/CVE-2018-7492" }, { "category": "external", "summary": "SUSE Bug 1082962 for CVE-2018-7492", "url": "https://bugzilla.suse.com/1082962" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.33.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.33.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-09-06T13:01:35Z", "details": "moderate" } ], "title": "CVE-2018-7492" } ] }
rhsa-2018_1854
Vulnerability from csaf_redhat
Published
2018-06-19 04:58
Modified
2024-12-29 18:23
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC)
* kernel: net/packet: overflow in check for priv area size (CVE-2017-7308)
* kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access (CVE-2012-6701)
* kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830)
* kernel: Null pointer dereference via keyctl (CVE-2016-8650)
* kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671)
* kernel: Race condition between multiple sys_perf_event_open() calls (CVE-2017-6001)
* kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c (CVE-2017-7616)
* kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism (CVE-2017-7889)
* kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c (CVE-2017-8890)
* kernel: net: sctp_v6_create_accept_sk function mishandles inheritance (CVE-2017-9075)
* kernel: net: IPv6 DCCP implementation mishandles inheritance (CVE-2017-9076)
* kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance (CVE-2017-9077)
* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190)
* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121)
* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203)
* kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash (CVE-2018-1130)
* kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Vitaly Mayatskih for reporting CVE-2017-12190; and Evgenii Shatokhin (Virtuozzo Team) for reporting CVE-2018-1130. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat).
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.10 Release Notes and Red Hat Enterprise Linux 6.10 Technical Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC)\n\n* kernel: net/packet: overflow in check for priv area size (CVE-2017-7308)\n\n* kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory locking on files and size of access (CVE-2012-6701)\n\n* kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830)\n\n* kernel: Null pointer dereference via keyctl (CVE-2016-8650)\n\n* kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671)\n\n* kernel: Race condition between multiple sys_perf_event_open() calls (CVE-2017-6001)\n\n* kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c (CVE-2017-7616)\n\n* kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism (CVE-2017-7889)\n\n* kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c (CVE-2017-8890)\n\n* kernel: net: sctp_v6_create_accept_sk function mishandles inheritance (CVE-2017-9075)\n\n* kernel: net: IPv6 DCCP implementation mishandles inheritance (CVE-2017-9076)\n\n* kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance (CVE-2017-9077)\n\n* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190)\n\n* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121)\n\n* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203)\n\n* kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash (CVE-2018-1130)\n\n* kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; Vitaly Mayatskih for reporting CVE-2017-12190; and Evgenii Shatokhin (Virtuozzo Team) for reporting CVE-2018-1130. The CVE-2017-15121 issue was discovered by Miklos Szeredi (Red Hat).\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 6.10 Release Notes and Red Hat Enterprise Linux 6.10 Technical Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:1854", "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html", "url": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html", "url": "https://access.redhat.com/documentation/en-US/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html" }, { "category": "external", "summary": "869942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869942" }, { "category": "external", "summary": "1314275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314275" }, { "category": "external", "summary": "1314288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314288" }, { "category": "external", "summary": "1395187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187" }, { "category": "external", "summary": "1422825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825" }, { "category": "external", "summary": "1436649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649" }, { "category": "external", "summary": "1437404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404" }, { "category": "external", "summary": "1441088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088" }, { "category": "external", "summary": "1444493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493" }, { "category": "external", "summary": "1448170", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1448170" }, { "category": "external", "summary": "1450972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972" }, { "category": "external", "summary": "1452688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688" }, { "category": "external", "summary": "1452691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691" }, { "category": "external", "summary": "1452744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744" }, { "category": "external", "summary": "1495089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089" }, { "category": "external", "summary": "1497152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497152" }, { "category": "external", "summary": "1520893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893" }, { "category": "external", "summary": "1550811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811" }, { "category": "external", "summary": "1551051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051" }, { "category": "external", "summary": "1560494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1560494" }, { "category": "external", "summary": "1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "1576419", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576419" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1854.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-12-29T18:23:49+00:00", "generator": { "date": "2024-12-29T18:23:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.4" } }, "id": "RHSA-2018:1854", "initial_release_date": "2018-06-19T04:58:56+00:00", "revision_history": [ { "date": "2018-06-19T04:58:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-06-19T04:58:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-29T18:23:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.el6.x86_64", "product": { "name": "perf-0:2.6.32-754.el6.x86_64", "product_id": "perf-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-0:2.6.32-754.el6.x86_64", "product_id": "kernel-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-754.el6.x86_64", "product_id": "python-perf-0:2.6.32-754.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-754.el6.i686", "product_id": "kernel-debug-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.el6.i686", "product": { "name": "perf-0:2.6.32-754.el6.i686", "product_id": "perf-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-754.el6.i686", "product_id": "kernel-devel-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.el6.i686", "product": { "name": "kernel-0:2.6.32-754.el6.i686", "product_id": "kernel-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-754.el6.i686", "product_id": "kernel-headers-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.el6.i686", "product": { "name": "python-perf-0:2.6.32-754.el6.i686", "product_id": "python-perf-0:2.6.32-754.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-754.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-754.el6.noarch", "product_id": "kernel-doc-0:2.6.32-754.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-754.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-754.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.el6.src", "product": { "name": "kernel-0:2.6.32-754.el6.src", "product_id": "kernel-0:2.6.32-754.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.el6.s390x", "product": { "name": "python-perf-0:2.6.32-754.el6.s390x", "product_id": "python-perf-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-754.el6.s390x", "product_id": "kernel-debug-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.el6.s390x", "product": { "name": "perf-0:2.6.32-754.el6.s390x", "product_id": "perf-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-754.el6.s390x", "product_id": "kernel-devel-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-0:2.6.32-754.el6.s390x", "product_id": "kernel-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-754.el6.s390x", "product_id": "kernel-headers-0:2.6.32-754.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-754.el6.ppc64", "product_id": "python-perf-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.el6.ppc64", "product": { "name": "perf-0:2.6.32-754.el6.ppc64", "product_id": "perf-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-0:2.6.32-754.el6.ppc64", "product_id": "kernel-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-754.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-754.el6.src" }, "product_reference": "kernel-0:2.6.32-754.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-754.el6.i686" }, "product_reference": "perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-6701", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314288" } ], "notes": [ { "category": "description", "text": "It was found that AIO interface didn\u0027t use the proper rw_verify_area() helper function with extended functionality, for example, mandatory locking on the file. Also rw_verify_area() makes extended checks, for example, that the size of the access doesn\u0027t cause overflow of the provided offset limits. This integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory locking on files and size of access", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6. Future Linux kernel updates for the respective releases might address this issue.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2 as the corresponding fix is already present.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-6701" }, { "category": "external", "summary": "RHBZ#1314288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-6701", "url": "https://www.cve.org/CVERecord?id=CVE-2012-6701" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-6701", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6701" } ], "release_date": "2012-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory locking on files and size of access" }, { "cve": "CVE-2015-8830", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1314275" } ], "notes": [ { "category": "description", "text": "Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec. NOTE: this vulnerability exists because of a CVE-2012-6701 regression.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: AIO write triggers integer overflow in some protocols", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, as the related AIO vector code is not present in this product.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7. Future Linux kernel updates for the respective releases might address this issue.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux MRG-2. This flaw is not currently planned to be addressed in future updates due to MRG-2 being an EUS release. For additional information, refer to the Extended Update Support (EUS) Guide: https://access.redhat.com/articles/rhel-eus.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-8830" }, { "category": "external", "summary": "RHBZ#1314275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1314275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-8830", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8830" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-8830", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8830" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2016/q2/479", "url": "http://seclists.org/oss-sec/2016/q2/479" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=735", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=735" } ], "release_date": "2015-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: AIO write triggers integer overflow in some protocols" }, { "cve": "CVE-2016-8650", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2016-11-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1395187" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference via keyctl", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels.\n\nThis issue does not affect kernels that ship with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8650" }, { "category": "external", "summary": "RHBZ#1395187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1395187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8650", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8650" } ], "release_date": "2016-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference via keyctl" }, { "cve": "CVE-2017-2671", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2017-03-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1436649" } ], "notes": [ { "category": "description", "text": "A race condition leading to a NULL pointer dereference was found in the Linux kernel\u0027s Link Layer Control implementation. A local attacker with access to ping sockets could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ping socket / AF_LLC connect() sin_family race", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2671" }, { "category": "external", "summary": "RHBZ#1436649", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1436649" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2671" } ], "release_date": "2017-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ping socket / AF_LLC connect() sin_family race" }, { "cve": "CVE-2017-6001", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2017-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1422825" } ], "notes": [ { "category": "description", "text": "It was found that the original fix for CVE-2016-6786 was incomplete. There exist a race between two concurrent sys_perf_event_open() calls when both try and move the same pre-existing software group into a hardware context.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition between multiple sys_perf_event_open() calls", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the perf subsystem where the flaw was found is not present in this product.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6001" }, { "category": "external", "summary": "RHBZ#1422825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1422825" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6001", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6001" } ], "release_date": "2017-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition between multiple sys_perf_event_open() calls" }, { "cve": "CVE-2017-7308", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2017-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1437404" } ], "notes": [ { "category": "description", "text": "It was found that the packet_set_ring() function of the Linux kernel\u0027s networking implementation did not properly validate certain block-size data. A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow resulting in a system crash or a privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/packet: overflow in check for priv area size", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect Red Hat Enterprise Linux 5.\n\nIn a default or common use of Red Hat Enterprise Linux 6 and 7 this issue does not allow an unprivileged local user elevate their privileges on the system. In order to exploit this issue the attacker needs CAP_NET_RAW capability, which needs to be granted by the administrator to the attacker\u0027s account. Since Red Hat Enterprise Linux 6 does not have namespaces support and Red Hat Enterprise Linux 7 does not have unprivileged user namespaces enabled by default, local unprivileged users also cannot abuse namespaces feature to grant this capability to themselves and elevate their privileges.\n\nSo, this issue does not affect Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 in the default configuration. Future updates for the respective releases will address this issue to secure non-default configurations.\n\nIn the non-default configuration mentioned above only Red Hat Enterprise Linux 7 is vulnerable to a privilege escalation. Red Hat Enterprise Linux 6 is vulnerable only to a denial of service (DoS) due to a system crash, hence the impact on Red Hat Enterprise Linux 6 is rated as being Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7308" }, { "category": "external", "summary": "RHBZ#1437404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1437404" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7308", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7308" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html", "url": "https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html" } ], "release_date": "2017-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/packet: overflow in check for priv area size" }, { "cve": "CVE-2017-7616", "cwe": { "id": "CWE-390", "name": "Detection of Error Condition Without Action" }, "discovery_date": "2017-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1441088" } ], "notes": [ { "category": "description", "text": "Incorrect error handling in the set_mempolicy() and mbind() compat syscalls in \u0027mm/mempolicy.c\u0027 in the Linux kernel allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 on ppc64 and ppc64le platforms. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6 and 7 on ppc64 and ppc64le platforms. Future Linux kernel updates for the respective releases might address this issue.\n\nOnly ppc64 and ppc64le hardware platforms are vulnerable. The Linux kernel packages for other platforms which Red Hat ships (i386, x86_64, s390x) are not vulnerable to this security flaw.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux MRG-2 as this product is shipped for x86_64 hardware platform only.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7616" }, { "category": "external", "summary": "RHBZ#1441088", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441088" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7616", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7616" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7616" } ], "release_date": "2017-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c" }, { "cve": "CVE-2017-7889", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2017-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1444493" } ], "notes": [ { "category": "description", "text": "The mm subsystem in the Linux kernel through 4.10.10 does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism, which allows local users to read or write to kernel memory locations in the first megabyte (and bypass slab-allocation access restrictions) via an application that opens the /dev/mem file, related to arch/x86/mm/init.c and drivers/char/mem.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7889" }, { "category": "external", "summary": "RHBZ#1444493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1444493" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7889", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7889" } ], "release_date": "2017-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism" }, { "cve": "CVE-2017-8890", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-05-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1450972" } ], "notes": [ { "category": "description", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "RHBZ#1450972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1450972" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-8890", "url": "https://www.cve.org/CVERecord?id=CVE-2017-8890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8890" } ], "release_date": "2017-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c" }, { "cve": "CVE-2017-9075", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452691" } ], "notes": [ { "category": "description", "text": "The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: sctp_v6_create_accept_sk function mishandles inheritance", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9075" }, { "category": "external", "summary": "RHBZ#1452691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452691" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9075", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9075" } ], "release_date": "2017-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: sctp_v6_create_accept_sk function mishandles inheritance" }, { "cve": "CVE-2017-9076", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452688" } ], "notes": [ { "category": "description", "text": "The IPv6 DCCP implementation in the Linux kernel mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: IPv6 DCCP implementation mishandles inheritance", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9076" }, { "category": "external", "summary": "RHBZ#1452688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9076", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9076" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9076", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9076" } ], "release_date": "2017-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: IPv6 DCCP implementation mishandles inheritance" }, { "cve": "CVE-2017-9077", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1452744" } ], "notes": [ { "category": "description", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of this product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "RHBZ#1452744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9077", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9077" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9077", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9077" } ], "release_date": "2017-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance" }, { "acknowledgments": [ { "names": [ "Vitaly Mayatskih" ] } ], "cve": "CVE-2017-12190", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2017-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495089" } ], "notes": [ { "category": "description", "text": "It was found that in the Linux kernel through v4.14-rc5, bio_map_user_iov() and bio_unmap_user() in \u0027block/bio.c\u0027 do unbalanced pages refcounting if IO vector has small consecutive buffers belonging to the same page. bio_add_pc_page() merges them into one, but the page reference is never dropped, causing a memory leak and possible system lockup due to out-of-memory condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak when merging buffers in SCSI IO vectors", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "RHBZ#1495089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12190", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190" } ], "release_date": "2017-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak when merging buffers in SCSI IO vectors" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2017-15121", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2017-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1520893" } ], "notes": [ { "category": "description", "text": "A non-privileged user is able to mount a fuse filesystem on RHEL 6 or 7 and crash a system if an application punches a hole in a file that does not end aligned to a page boundary.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, Red Hat Enterprise Linux 7 for ARM and Red Hat Enterprise Linux 7 for Power LE.\n\nThis issue affects the versions of the Linux kernel as shipped with 6, 7 and Red Hat Enterprise MRG 2. Future updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15121" }, { "category": "external", "summary": "RHBZ#1520893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1520893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15121", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15121" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15121" } ], "release_date": "2017-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: vfs: BUG in truncate_inode_pages_range() and fuse client" }, { "cve": "CVE-2017-18203", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2018-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1550811" } ], "notes": [ { "category": "description", "text": "The Linux kernel, before version 4.14.3, is vulnerable to a denial of service in drivers/md/dm.c:dm_get_from_kobject() which can be caused by local users leveraging a race condition with __dm_destroy() during creation and removal of DM devices. Only privileged local users (with CAP_SYS_ADMIN capability) can directly perform the ioctl operations for dm device creation and removal and this would typically be outside the direct control of the unprivileged attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, as the code with the flaw is not present in this product.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-18203" }, { "category": "external", "summary": "RHBZ#1550811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1550811" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-18203", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18203" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18203" } ], "release_date": "2017-11-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service" }, { "acknowledgments": [ { "names": [ "Evgenii Shatokhin" ], "organization": "Virtuozzo Team" } ], "cve": "CVE-2018-1130", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1576419" } ], "notes": [ { "category": "description", "text": "A null pointer dereference in dccp_write_xmit() function in net/dccp/output.c in the Linux kernel allows a local user to cause a denial of service by a number of certain crafted system calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1130" }, { "category": "external", "summary": "RHBZ#1576419", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576419" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1130", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1130" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1130" } ], "release_date": "2018-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash" }, { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" }, { "names": [ "Ken Johnson" ], "organization": "Microsoft Security Response Center" } ], "cve": "CVE-2018-3639", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1566890" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load \u0026 Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative store bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/ssbd", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-3639" }, { "category": "external", "summary": "RHBZ#1566890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2018-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-3639" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/ssbd", "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "category": "external", "summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf", "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf" }, { "category": "external", "summary": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf", "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" } ], "release_date": "2018-05-21T21:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative store bypass" }, { "cve": "CVE-2018-5803", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1551051" } ], "notes": [ { "category": "description", "text": "An error in the \"_sctp_make_chunk()\" function (net/sctp/sm_make_chunk.c) when handling SCTP, packet length can be exploited by a malicious local user to cause a kernel crash and a DoS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-5803" }, { "category": "external", "summary": "RHBZ#1551051", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1551051" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-5803", "url": "https://www.cve.org/CVERecord?id=CVE-2018-5803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5803" } ], "release_date": "2018-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-06-19T04:58:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.i686", "6Client-optional:perf-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-0:2.6.32-754.el6.s390x", "6Client-optional:perf-0:2.6.32-754.el6.x86_64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-0:2.6.32-754.el6.i686", "6Client:kernel-0:2.6.32-754.el6.ppc64", "6Client:kernel-0:2.6.32-754.el6.s390x", "6Client:kernel-0:2.6.32-754.el6.src", "6Client:kernel-0:2.6.32-754.el6.x86_64", "6Client:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.i686", "6Client:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client:kernel-devel-0:2.6.32-754.el6.i686", "6Client:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client:kernel-devel-0:2.6.32-754.el6.s390x", "6Client:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client:kernel-doc-0:2.6.32-754.el6.noarch", "6Client:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client:kernel-headers-0:2.6.32-754.el6.i686", "6Client:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client:kernel-headers-0:2.6.32-754.el6.s390x", "6Client:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.i686", "6Client:perf-0:2.6.32-754.el6.ppc64", "6Client:perf-0:2.6.32-754.el6.s390x", "6Client:perf-0:2.6.32-754.el6.x86_64", "6Client:perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Client:python-perf-0:2.6.32-754.el6.i686", "6Client:python-perf-0:2.6.32-754.el6.ppc64", "6Client:python-perf-0:2.6.32-754.el6.s390x", "6Client:python-perf-0:2.6.32-754.el6.x86_64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Client:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.src", "6ComputeNode-optional:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-0:2.6.32-754.el6.src", "6ComputeNode:kernel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-754.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-754.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.i686", "6ComputeNode:perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-0:2.6.32-754.el6.x86_64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6ComputeNode:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-0:2.6.32-754.el6.src", "6Server-optional:kernel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Server-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Server-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.i686", "6Server-optional:perf-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-0:2.6.32-754.el6.s390x", "6Server-optional:perf-0:2.6.32-754.el6.x86_64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-0:2.6.32-754.el6.i686", "6Server:kernel-0:2.6.32-754.el6.ppc64", "6Server:kernel-0:2.6.32-754.el6.s390x", "6Server:kernel-0:2.6.32-754.el6.src", "6Server:kernel-0:2.6.32-754.el6.x86_64", "6Server:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Server:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.i686", "6Server:kernel-debug-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Server:kernel-devel-0:2.6.32-754.el6.i686", "6Server:kernel-devel-0:2.6.32-754.el6.ppc64", "6Server:kernel-devel-0:2.6.32-754.el6.s390x", "6Server:kernel-devel-0:2.6.32-754.el6.x86_64", "6Server:kernel-doc-0:2.6.32-754.el6.noarch", "6Server:kernel-firmware-0:2.6.32-754.el6.noarch", "6Server:kernel-headers-0:2.6.32-754.el6.i686", "6Server:kernel-headers-0:2.6.32-754.el6.ppc64", "6Server:kernel-headers-0:2.6.32-754.el6.s390x", "6Server:kernel-headers-0:2.6.32-754.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.i686", "6Server:perf-0:2.6.32-754.el6.ppc64", "6Server:perf-0:2.6.32-754.el6.s390x", "6Server:perf-0:2.6.32-754.el6.x86_64", "6Server:perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Server:python-perf-0:2.6.32-754.el6.i686", "6Server:python-perf-0:2.6.32-754.el6.ppc64", "6Server:python-perf-0:2.6.32-754.el6.s390x", "6Server:python-perf-0:2.6.32-754.el6.x86_64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Server:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-0:2.6.32-754.el6.src", "6Workstation-optional:kernel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation-optional:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation-optional:python-perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-0:2.6.32-754.el6.i686", "6Workstation:kernel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-0:2.6.32-754.el6.src", "6Workstation:kernel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Workstation:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-754.el6.i686", "6Workstation:kernel-devel-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-754.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-754.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-754.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-754.el6.i686", "6Workstation:kernel-headers-0:2.6.32-754.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-754.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-754.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.i686", "6Workstation:perf-0:2.6.32-754.el6.ppc64", "6Workstation:perf-0:2.6.32-754.el6.s390x", "6Workstation:perf-0:2.6.32-754.el6.x86_64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:perf-debuginfo-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-0:2.6.32-754.el6.i686", "6Workstation:python-perf-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-0:2.6.32-754.el6.x86_64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.i686", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.ppc64", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.s390x", "6Workstation:python-perf-debuginfo-0:2.6.32-754.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:1854" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-optional:kernel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-0:2.6.32-754.el6.src", "6Client-optional:kernel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-abi-whitelists-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-bootwrapper-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debug-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-debuginfo-common-i686-0:2.6.32-754.el6.i686", "6Client-optional:kernel-debuginfo-common-ppc64-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-debuginfo-common-s390x-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-debuginfo-common-x86_64-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.i686", "6Client-optional:kernel-devel-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-devel-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-devel-0:2.6.32-754.el6.x86_64", "6Client-optional:kernel-doc-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-firmware-0:2.6.32-754.el6.noarch", "6Client-optional:kernel-headers-0:2.6.32-754.el6.i686", "6Client-optional:kernel-headers-0:2.6.32-754.el6.ppc64", "6Client-optional:kernel-headers-0:2.6.32-754.el6.s390x", "6Client-optional:kernel-headers-0:2.6.32-754.el6.x86_64", "6Client-optional:ker