Action not permitted
Modal body text goes here.
CVE-2020-29661
Vulnerability from cvelistv5
Published
2020-12-09 16:57
Modified
2024-08-04 16:55
Severity ?
EPSS score ?
Summary
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:55:10.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc" }, { "name": "[oss-security] 20201210 2 kernel issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-b732958765", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "FEDORA-2020-bc0cc81a7a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "name": "DSA-4843", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T18:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc" }, { "name": "[oss-security] 20201210 2 kernel issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-b732958765", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "FEDORA-2020-bc0cc81a7a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "name": "DSA-4843", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29661", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc" }, { "name": "[oss-security] 20201210 2 kernel issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-b732958765", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "FEDORA-2020-bc0cc81a7a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "name": "DSA-4843", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2021.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "name": "http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210122-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "name": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29661", "datePublished": "2020-12-09T16:57:41", "dateReserved": "2020-12-09T00:00:00", "dateUpdated": "2024-08-04T16:55:10.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-29661\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-12-09T17:15:31.807\",\"lastModified\":\"2024-11-21T05:24:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema de bloqueo en el subsistema tty del kernel de Linux versiones hasta 5.9.13. El archivo drivers/tty/tty_jobctrl.c, permite un ataque de uso de la memoria previamente liberada contra TIOCSPGRP, tambi\u00e9n se conoce como CID-54ffccbf053b\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"},{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.26\",\"versionEndExcluding\":\"4.4.248\",\"matchCriteriaId\":\"B2FC0FB1-DC18-46A4-A31B-F97DD3EE3137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.9.248\",\"matchCriteriaId\":\"B21174F6-B764-44AB-A945-3D629DBB3B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.14.212\",\"matchCriteriaId\":\"4FCD12D6-C35F-4079-B6BA-3F788CFC6FB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.15\",\"versionEndExcluding\":\"4.19.163\",\"matchCriteriaId\":\"9079A481-FEBA-4CEC-A294-9B95706DDF17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.83\",\"matchCriteriaId\":\"0C60D505-E4D6-40DF-A835-9094A5DFDDBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.9.14\",\"matchCriteriaId\":\"7FB6E3D6-0F55-42F3-A3BA-AA6E149E1C5F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046FB51E-B768-44D3-AEB5-D857145CA840\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD92BFA-9117-4E6E-A13F-ED064B4B7284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7DA42F-5D64-4967-A2D4-6210FE507841\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E73901F-666D-4D8B-BDFD-93DD2F70C74B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FD5AED-42CF-4918-B32C-D675738EF15C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B25BEF-8708-4E2C-8BA6-EBCD5267EB04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0F11D2-B5D9-46B4-BFC5-C86BC87D516A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04E3BD77-8915-4FFC-8483-5DB5D610F829\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E94ECB-BB51-4364-BEDD-8648C193196F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.4.0\",\"versionEndIncluding\":\"7.7.1\",\"matchCriteriaId\":\"26F05F85-7458-4C8F-B93F-93C92E506A40\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/12/10/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210122-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4843\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/12/10/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210122-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4843\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2021_0940
Vulnerability from csaf_redhat
Published
2021-03-18 16:54
Modified
2024-11-15 07:30
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0940", "url": "https://access.redhat.com/errata/RHSA-2021:0940" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0940.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-15T07:30:22+00:00", "generator": { "date": "2024-11-15T07:30:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0940", "initial_release_date": "2021-03-18T16:54:35+00:00", "revision_history": [ { "date": "2021-03-18T16:54:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-18T16:54:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:30:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "product_id": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_46_1@1-4.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "product_id": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_48_1@1-4.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_54_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_56_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-1.el7?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "product": { "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_46_1@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_48_1@1-4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_54_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_54_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_56_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_56_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64", "product": { "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64", "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_46_1@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_48_1@1-4.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_54_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_54_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_56_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_56_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_58_2-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_61_2-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_62_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_65_1-debuginfo@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1@1-1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "product": { "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "product_id": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_66_1-debuginfo@1-1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src" }, "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le" }, "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "relates_to_product_reference": "7Server-7.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64" }, "product_reference": "kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64", "relates_to_product_reference": "7Server-7.6.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906525" } ], "notes": [ { "category": "description", "text": "A locking vulnerability was found in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. This flaw allows a local attacker to possibly corrupt memory or escalate privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "RHBZ#1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29661", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-18T16:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0940" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_46_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_48_1-0:1-4.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_54_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_56_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_58_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_61_2-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_62_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_65_1-debuginfo-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.src", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-0:1-1.el7.x86_64", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.ppc64le", "7Server-7.6.EUS:kpatch-patch-3_10_0-957_66_1-debuginfo-0:1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free" } ] }
rhsa-2021_0763
Vulnerability from csaf_redhat
Published
2021-03-09 09:38
Modified
2024-11-22 14:38
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: bad kfree in auditfilter.c may lead to escalation of privilege (CVE-2020-0444)
* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: bad kfree in auditfilter.c may lead to escalation of privilege (CVE-2020-0444)\n\n* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)\n\n* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0763", "url": "https://access.redhat.com/errata/RHSA-2021:0763" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1877571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877571" }, { "category": "external", "summary": "1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "1920474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0763.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-22T14:38:29+00:00", "generator": { "date": "2024-11-22T14:38:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0763", "initial_release_date": "2021-03-09T09:38:39+00:00", "revision_history": [ { "date": "2021-03-09T09:38:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-09T09:38:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:38:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193-0:1-10.el8.src", "product": { "name": "kpatch-patch-4_18_0-193-0:1-10.el8.src", "product_id": "kpatch-patch-4_18_0-193-0:1-10.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193@1-10.el8?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2@1-8.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-7.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-5.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-5.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-5.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-3.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-3.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-3.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-3.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-3.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "product_id": "kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193@1-10.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "product_id": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193-debugsource@1-10.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "product_id": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193-debuginfo@1-10.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2@1-8.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2-debugsource@1-8.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2-debuginfo@1-8.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debugsource@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debuginfo@1-7.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-5.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-3.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-3.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "product_id": "kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193@1-10.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "product_id": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193-debugsource@1-10.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "product_id": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193-debuginfo@1-10.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2@1-8.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2-debugsource@1-8.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2-debuginfo@1-8.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debugsource@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debuginfo@1-7.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debugsource@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_13_2-debuginfo@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debugsource@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_14_3-debuginfo@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debugsource@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_19_1-debuginfo@1-5.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_28_1-debuginfo@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_29_1-debuginfo@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_37_1-debuginfo@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_40_1-debuginfo@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_41_1-debuginfo@1-3.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-0:1-10.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src" }, "product_reference": "kpatch-patch-4_18_0-193-0:1-10.el8.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-0:1-10.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0444", "cwe": { "id": "CWE-244", "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920474" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in audit_data_to_entry can lead to a local escalation of privilege without user interaction needed. A local attacker with special user privilege could crash the system leading to information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "RHBZ#1920474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-09T09:38:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0763" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege" }, { "acknowledgments": [ { "names": [ "Will McVicker" ], "organization": "Google" } ], "cve": "CVE-2020-25211", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1877571" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A local attacker, able to inject conntrack netlink configuration, could overflow a local buffer causing crashes or triggering the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact (Red Hat Enterprise Linux 7 and lower) because of the need to have CAP_NET_ADMIN privileges.\n\nThis flaw is rated as having Important (Red Hat Enterprise Linux 8) impact because of the need to have CAP_NET_ADMIN privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25211" }, { "category": "external", "summary": "RHBZ#1877571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877571" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25211", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25211" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25211", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25211" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cc5ef91d2ff94d2bf2de3b3585423e8a1051cb6" } ], "release_date": "2020-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-09T09:38:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0763" }, { "category": "workaround", "details": "To mitigate this issue, prevent module nf_conntrack_netlink from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.\n\nAlternatively, if nf_conntrack_netlink is being used, on Red Hat Enterprise Linux 8, you can disable unprivileged user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c" }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906525" } ], "notes": [ { "category": "description", "text": "A locking vulnerability was found in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. This flaw allows a local attacker to possibly corrupt memory or escalate privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "RHBZ#1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29661", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-09T09:38:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0763" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-10.el8.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_13_2-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_14_3-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debuginfo-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_19_1-debugsource-0:1-5.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-8.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_28_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_29_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_37_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_40_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_41_1-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.src", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-7.el8_2.x86_64", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.ppc64le", "BaseOS-8.2.0.Z.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-7.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free" } ] }
rhsa-2021_1288
Vulnerability from csaf_redhat
Published
2021-04-20 15:19
Modified
2024-11-15 11:46
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)
* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)
* kernel: increase slab leak leads to DoS (CVE-2021-20265)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Enable CI and changelog for GitLab workflow (BZ#1930523)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)\n\n* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364)\n\n* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365)\n\n* kernel: increase slab leak leads to DoS (CVE-2021-20265)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Enable CI and changelog for GitLab workflow (BZ#1930523)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1288", "url": "https://access.redhat.com/errata/RHSA-2021:1288" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "1908827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908827" }, { "category": "external", "summary": "1930078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930078" }, { "category": "external", "summary": "1930080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930080" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1288.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-15T11:46:47+00:00", "generator": { "date": "2024-11-15T11:46:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1288", "initial_release_date": "2021-04-20T15:19:59+00:00", "revision_history": [ { "date": "2021-04-20T15:19:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-04-20T15:19:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T11:46:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.39.1.el6.src", "product": { "name": "kernel-0:2.6.32-754.39.1.el6.src", "product_id": "kernel-0:2.6.32-754.39.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.39.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-754.39.1.el6.x86_64", "product_id": "perf-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.39.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.39.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-754.39.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-754.39.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.39.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.39.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.39.1.el6.i686", "product": { "name": "perf-0:2.6.32-754.39.1.el6.i686", "product_id": "perf-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.39.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.39.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-754.39.1.el6.i686", "product_id": "python-perf-0:2.6.32-754.39.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.39.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "perf-0:2.6.32-754.39.1.el6.s390x", "product_id": "perf-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.39.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-754.39.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-754.39.1.el6.s390x", "product_id": "python-perf-0:2.6.32-754.39.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-754.39.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.39.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-754.39.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-754.39.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-754.39.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.39.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.39.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.src", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.39.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.39.1.el6.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.39.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "perf-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6 ELS)", "product_id": "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.src", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-754.39.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-754.39.1.el6.noarch", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-754.39.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "perf-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "relates_to_product_reference": "6Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6 ELS)", "product_id": "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906525" } ], "notes": [ { "category": "description", "text": "A locking vulnerability was found in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. This flaw allows a local attacker to possibly corrupt memory or escalate privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "RHBZ#1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29661", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-20T15:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1288" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free" }, { "acknowledgments": [ { "names": [ "Jay Shin" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-20265", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-11-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1908827" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: increase slab leak leads to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20265" }, { "category": "external", "summary": "RHBZ#1908827", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1908827" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20265", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20265" } ], "release_date": "2016-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-20T15:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1288" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: increase slab leak leads to DoS" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27364", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930080" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. An out-of-bounds read was discovered in the libiscsi module that could lead to reading kernel memory or a crash. The highest threat from this vulnerability is to data confidentiality as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds read in libiscsi module", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27364" }, { "category": "external", "summary": "RHBZ#1930080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930080" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27364" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-20T15:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1288" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: out-of-bounds read in libiscsi module" }, { "acknowledgments": [ { "names": [ "Adam Nichols" ], "organization": "GRIMM" } ], "cve": "CVE-2021-27365", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930078" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A heap buffer overflow in the iSCSI subsystem is triggered by setting an iSCSI string attribute to a value larger than one page and then trying to read it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap buffer overflow in the iSCSI subsystem", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-27365" }, { "category": "external", "summary": "RHBZ#1930078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-27365", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-27365" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/03/06/1", "url": "https://www.openwall.com/lists/oss-security/2021/03/06/1" } ], "release_date": "2021-03-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-04-20T15:19:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1288" }, { "category": "workaround", "details": "The LIBISCSI module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n~~~\n# echo \"install libiscsi /bin/true\" \u003e\u003e /etc/modprobe.d/disable-libiscsi.conf\n~~~\nThe system will need to be restarted if the libiscsi modules are loaded. In most circumstances, the libiscsi kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires iscsi to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.src", "6Server-optional-ELS:kernel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-abi-whitelists-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debug-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-debuginfo-common-i686-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-debuginfo-common-s390x-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-debuginfo-common-x86_64-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-devel-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-doc-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-firmware-0:2.6.32-754.39.1.el6.noarch", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-headers-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:kernel-kdump-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:kernel-kdump-devel-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-0:2.6.32-754.39.1.el6.x86_64", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.i686", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.s390x", "6Server-optional-ELS:python-perf-debuginfo-0:2.6.32-754.39.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap buffer overflow in the iSCSI subsystem" } ] }
rhsa-2021_0689
Vulnerability from csaf_redhat
Published
2021-03-03 11:46
Modified
2024-11-22 14:38
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: bad kfree in auditfilter.c may lead to escalation of privilege (CVE-2020-0444)
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: bad kfree in auditfilter.c may lead to escalation of privilege (CVE-2020-0444)\n\n* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0689", "url": "https://access.redhat.com/errata/RHSA-2021:0689" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "1920474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0689.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2024-11-22T14:38:07+00:00", "generator": { "date": "2024-11-22T14:38:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0689", "initial_release_date": "2021-03-03T11:46:29+00:00", "revision_history": [ { "date": "2021-03-03T11:46:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-03T11:46:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:38:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_8_1@1-10.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2@1-8.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-7.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-5.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-5.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-3.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-3.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-2.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_8_1@1-10.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2@1-8.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2-debugsource@1-8.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2-debuginfo@1-8.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debugsource@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debuginfo@1-7.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-5.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-5.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-5.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-5.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-5.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-5.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-3.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-2.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_8_1@1-10.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2@1-8.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2-debugsource@1-8.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2-debuginfo@1-8.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debugsource@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debuginfo@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2@1-5.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debugsource@1-5.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_24_2-debuginfo@1-5.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1@1-5.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debugsource@1-5.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_27_1-debuginfo@1-5.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debugsource@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_32_1-debuginfo@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debugsource@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_34_1-debuginfo@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debugsource@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_38_1-debuginfo@1-2.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le" }, "product_reference": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-0444", "cwe": { "id": "CWE-244", "name": "Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)" }, "discovery_date": "2021-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1920474" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A logic error in audit_data_to_entry can lead to a local escalation of privilege without user interaction needed. A local attacker with special user privilege could crash the system leading to information leak. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "RHBZ#1920474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0444", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0444" } ], "release_date": "2021-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T11:46:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0689" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: bad kfree in auditfilter.c may lead to escalation of privilege" }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906525" } ], "notes": [ { "category": "description", "text": "A locking vulnerability was found in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. This flaw allows a local attacker to possibly corrupt memory or escalate privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "RHBZ#1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29661", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-03-03T11:46:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:0689" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-8.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_24_2-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debuginfo-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_27_1-debugsource-0:1-5.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_32_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_34_1-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_38_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-10.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free" } ] }
rhsa-2021_0558
Vulnerability from csaf_redhat
Published
2021-02-16 14:28
Modified
2024-11-15 07:28
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
* kernel: performance counters race condition use-after-free (CVE-2020-14351)
* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Final fixes + drop alpha_support flag requirement for Tigerlake (BZ#1882620)
* OVS complains Invalid Argument on TCP packets going into conntrack (BZ#1892744)
* BUG: using smp_processor_id() in preemptible [00000000] code: handler106/3082 (BZ#1893281)
* Icelake performance - add intel_idle: Customize IceLake server support to RHEL-8 (BZ#1897183)
* [mlx5] IPV6 TOS rewrite flows are not getting offloaded in HW (BZ#1897688)
* RHEL 8.3 SAS - multipathd fails to re-establish paths during controller random reset (BZ#1900112)
* RHEL8.3 Beta - RHEL8.3 hangs on dbginfo.sh execution, crash dump generated (mm-) (BZ#1903019)
* Win10 guest automatic reboot after migration in Win10 and WSL2 on AMD hosts (BZ#1905084)
* block, dm: fix IO splitting for stacked devices (BZ#1905136)
* Failed to hotplug scsi-hd disks (BZ#1905214)
* PCI quirk needed to prevent GPU hang (BZ#1906516)
* RHEL8.2 - various patches to stabilize the OPAL error log processing and the powernv dump processing (ESS) (BZ#1907301)
* pmtu not working with tunnels as bridge ports and br_netfilter loaded (BZ#1907576)
* [ThinkPad X13/T14/T14s AMD]: Kdump failed (BZ#1907775)
* NFSv4 client improperly handles interrupted slots (BZ#1908312)
* NFSv4.1 client ignores ERR_DELAY during LOCK recovery, could lead to data corruption (BZ#1908313)
* [Regression] RHEL8.2 - [kernel 148.el8] cpu (sys) time regression in SAP HANA 2.0 benchmark benchInsertSubSelectPerformance (BZ#1908519)
* RHEL8: kernel-rt: kernel BUG at kernel/sched/deadline.c:1462! (BZ#1908731)
* SEV VM hang at efi_mokvar_sysfs_init+0xa9/0x19d during boot (BZ#1909243)
* C6gn support requires "Ensure dirty bit is preserved across pte_wrprotect" patch (BZ#1909577)
* [Lenovo 8.3 & 8.4 Bug] [Regression] No response from keyboard and mouse when boot from tboot kernel (BZ#1911555)
* Kernel crash with krb5p (BZ#1912478)
* [RHEL8] Need additional backports for FIPS 800-90A DRBG entropy seeding source (BZ#1912872)
* [Hyper-V][RHEL-8] Request to included a commit that adds a timeout to vmbus_wait_for_unload (BZ#1913528)
* Host becomes unresponsive during stress-ng --cyclic test rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: (BZ#1913964)
* RHEL8.4: Backport upstream RCU patches up to v5.6 (BZ#1915638)
* Missing mm backport to fix regression introduced by another mm backport (BZ#1915814)
* [Hyper-V][RHEL-8]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit (BZ#1917711)
* ionic 0000:39:00.0 ens2: IONIC_CMD_Q_INIT (40) failed: IONIC_RC_ERROR (-5) (BZ#1918372)
* [certification] mlx5_core depends on tls triggering TAINT_TECH_PREVIEW even if no ConnectX-6 card is present (BZ#1918743)
* kvm-rhel8.3 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. (BZ#1919885)
Enhancement(s):
* [Mellanox 8.4 FEAT] mlx5: Add messages when VF-LAG fails to start (BZ#1892344)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)\n\n* kernel: performance counters race condition use-after-free (CVE-2020-14351)\n\n* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Final fixes + drop alpha_support flag requirement for Tigerlake (BZ#1882620)\n\n* OVS complains Invalid Argument on TCP packets going into conntrack (BZ#1892744)\n\n* BUG: using smp_processor_id() in preemptible [00000000] code: handler106/3082 (BZ#1893281)\n\n* Icelake performance - add intel_idle: Customize IceLake server support to RHEL-8 (BZ#1897183)\n\n* [mlx5] IPV6 TOS rewrite flows are not getting offloaded in HW (BZ#1897688)\n\n* RHEL 8.3 SAS - multipathd fails to re-establish paths during controller random reset (BZ#1900112)\n\n* RHEL8.3 Beta - RHEL8.3 hangs on dbginfo.sh execution, crash dump generated (mm-) (BZ#1903019)\n\n* Win10 guest automatic reboot after migration in Win10 and WSL2 on AMD hosts (BZ#1905084)\n\n* block, dm: fix IO splitting for stacked devices (BZ#1905136)\n\n* Failed to hotplug scsi-hd disks (BZ#1905214)\n\n* PCI quirk needed to prevent GPU hang (BZ#1906516)\n\n* RHEL8.2 - various patches to stabilize the OPAL error log processing and the powernv dump processing (ESS) (BZ#1907301)\n\n* pmtu not working with tunnels as bridge ports and br_netfilter loaded (BZ#1907576)\n\n* [ThinkPad X13/T14/T14s AMD]: Kdump failed (BZ#1907775)\n\n* NFSv4 client improperly handles interrupted slots (BZ#1908312)\n\n* NFSv4.1 client ignores ERR_DELAY during LOCK recovery, could lead to data corruption (BZ#1908313)\n\n* [Regression] RHEL8.2 - [kernel 148.el8] cpu (sys) time regression in SAP HANA 2.0 benchmark benchInsertSubSelectPerformance (BZ#1908519)\n\n* RHEL8: kernel-rt: kernel BUG at kernel/sched/deadline.c:1462! (BZ#1908731)\n\n* SEV VM hang at efi_mokvar_sysfs_init+0xa9/0x19d during boot (BZ#1909243)\n\n* C6gn support requires \"Ensure dirty bit is preserved across pte_wrprotect\" patch (BZ#1909577)\n\n* [Lenovo 8.3 \u0026 8.4 Bug] [Regression] No response from keyboard and mouse when boot from tboot kernel (BZ#1911555)\n\n* Kernel crash with krb5p (BZ#1912478)\n\n* [RHEL8] Need additional backports for FIPS 800-90A DRBG entropy seeding source (BZ#1912872)\n\n* [Hyper-V][RHEL-8] Request to included a commit that adds a timeout to vmbus_wait_for_unload (BZ#1913528)\n\n* Host becomes unresponsive during stress-ng --cyclic test rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: (BZ#1913964)\n\n* RHEL8.4: Backport upstream RCU patches up to v5.6 (BZ#1915638)\n\n* Missing mm backport to fix regression introduced by another mm backport (BZ#1915814)\n\n* [Hyper-V][RHEL-8]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit (BZ#1917711)\n\n* ionic 0000:39:00.0 ens2: IONIC_CMD_Q_INIT (40) failed: IONIC_RC_ERROR (-5) (BZ#1918372)\n\n* [certification] mlx5_core depends on tls triggering TAINT_TECH_PREVIEW even if no ConnectX-6 card is present (BZ#1918743)\n\n* kvm-rhel8.3 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. (BZ#1919885)\n\nEnhancement(s):\n\n* [Mellanox 8.4 FEAT] mlx5: Add messages when VF-LAG fails to start (BZ#1892344)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0558", "url": "https://access.redhat.com/errata/RHSA-2021:0558" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1862849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862849" }, { "category": "external", "summary": "1894579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894579" }, { "category": "external", "summary": "1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0558.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-15T07:28:30+00:00", "generator": { "date": "2024-11-15T07:28:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0558", "initial_release_date": "2021-02-16T14:28:48+00:00", "revision_history": [ { "date": "2021-02-16T14:28:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-02-16T14:28:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T07:28:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "perf-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "perf-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.15.1.el8_3?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.15.1.el8_3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "perf-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "perf-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.15.1.el8_3?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.15.1.el8_3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "perf-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "perf-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.15.1.el8_3?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-240.15.1.el8_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "bpftool-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "perf-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "perf-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-240.15.1.el8_3?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-240.15.1.el8_3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-240.15.1.el8_3.src", "product": { "name": "kernel-0:4.18.0-240.15.1.el8_3.src", "product_id": "kernel-0:4.18.0-240.15.1.el8_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-240.15.1.el8_3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-240.15.1.el8_3?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "product": { "name": "kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "product_id": "kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-240.15.1.el8_3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.src", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-240.15.1.el8_3.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch" }, "product_reference": "kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "BaseOS-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.src", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-240.15.1.el8_3.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch" }, "product_reference": "kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "perf-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "relates_to_product_reference": "CRB-8.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ryota Shiga" ], "organization": "Flatt Security" }, { "names": [ "Zero Day Initiative" ] } ], "cve": "CVE-2020-14351", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-08-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1862849" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: performance counters race condition use-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "The Red Hat Enterprise Linux 7.2 and later kernels default to a safe /proc/sys/kernel/perf_event_paranoid setting; local administrators may have reason to change the setting to allow non privileged users to monitor performance statistics.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "RHBZ#1862849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862849" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-14351", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14351" } ], "release_date": "2020-11-06T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:0558" }, { "category": "workaround", "details": "While there is no way to disable the perf subsystem on Linux systems, reducing or removing users access to the perf events can effectively mitigate this flaw. Upstream kernel documentation has been written regarding this mechanism: https://www.kernel.org/doc/html/latest/admin-guide/perf-security.html.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: performance counters race condition use-after-free" }, { "cve": "CVE-2020-25705", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2020-08-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1894579" } ], "notes": [ { "category": "description", "text": "A flaw in the way reply ICMP packets are limited in the Linux kernel functionality was found that allows to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ICMP rate limiting can be used for DNS poisoning attack", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "RHBZ#1894579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894579" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25705", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25705" } ], "release_date": "2020-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:0558" }, { "category": "workaround", "details": "The mitigation is to disable ICMP destination unreachable messages.\n\nThe commands to disable UDP port unreachable ICMP reply messages:\n\niptables -I OUTPUT -p icmp --icmp-type destination-unreachable -j DROP\nservice iptables save\n\nFor additional information about \"service iptables save\" please read https://access.redhat.com/solutions/1597703\nIt is not recommended to apply this rule if host being used as forwarder (router) of IP packets.\n\nOr it is possible to use this firewall-cmd instead of iptables and the result is similar:\nfirewall-cmd --permanent --direct --add-rule ipv4 filter OUTPUT 0 -p icmp --icmp-type destination-unreachable -j DROP", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ICMP rate limiting can be used for DNS poisoning attack" }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906525" } ], "notes": [ { "category": "description", "text": "A locking vulnerability was found in the tty subsystem of the Linux kernel in drivers/tty/tty_jobctrl.c. This flaw allows a local attacker to possibly corrupt memory or escalate privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ], "known_not_affected": [ "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "RHBZ#1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29661", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29661" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-02-16T14:28:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:0558" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "BaseOS-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "BaseOS-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:bpftool-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.src", "CRB-8.3.0.Z.MAIN:kernel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-abi-whitelists-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-cross-headers-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-core-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debug-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-aarch64-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-ppc64le-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-s390x-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-debuginfo-common-x86_64-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-doc-0:4.18.0-240.15.1.el8_3.noarch", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-modules-extra-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-tools-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:kernel-tools-libs-devel-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-core-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-devel-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:kernel-zfcpdump-modules-extra-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-0:4.18.0-240.15.1.el8_3.x86_64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.aarch64", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.ppc64le", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.s390x", "CRB-8.3.0.Z.MAIN:python3-perf-debuginfo-0:4.18.0-240.15.1.el8_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free" } ] }
rhsa-2021_0765
Vulnerability from csaf_redhat
Published
2021-03-09 11:15
Modified
2024-11-22 14:38
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: bad kfree in auditfilter.c may lead to escalation of privilege (CVE-2020-0444)
* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)
* kernel: performance counters race condition use-after-free (CVE-2020-14351)
* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RHEL8.1 - net/smc: fix silent data corruption in SMC (BZ#1882241)
* [mlx5] VF interface stats are not reflected in "ip -s link show" / "ifconfig <vf>" commands (BZ#1889301)
* [mlx5] IPV6 TOS rewrite flows are not getting offloaded in HW (BZ#1897689)
* RHEL 8.1 - Call traces show I/O stuck for more than 120 sec when at least one path is available for NVMe/IB (BZ#1901525)
* RHEL8: kernel-rt: kernel BUG at kernel/sched/deadline.c:1462! (BZ#1908732)
* [Hyper-V][RHEL-8] Request to included a commit that adds a timeout to vmbus_wait_for_unload (BZ#1913529)
* Host becomes unresponsive during stress-ng --cyclic test rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: (BZ#1913965)
* race condition when creating child sockets from syncookies (BZ#1915530)
* Missing mm backport to fix regression introduced by another mm backport (BZ#1915815)
* On System Z, a hash needs state randomized for entropy extraction (BZ#1915817)
* [Hyper-V][RHEL-8]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit (BZ#1917712)
* kvm-rhel8.3 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. (BZ#1919886)
* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap (BZ#1929909)
* rpmbuild cannot build the userspace RPMs in the kernel package when the kernel itself is not built (BZ#1929911)
Enhancement(s):
* [Mellanox 8.4 FEAT] mlx5: Add messages when VF-LAG fails to start (BZ#1892345)
* Add kernel option to change cpumask for kernel threads (BZ#1915344)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: bad kfree in auditfilter.c may lead to escalation of privilege (CVE-2020-0444)\n\n* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211)\n\n* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an use-after-free (CVE-2020-29661)\n\n* kernel: performance counters race condition use-after-free (CVE-2020-14351)\n\n* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL8.1 - net/smc: fix silent data corruption in SMC (BZ#1882241)\n\n* [mlx5] VF interface stats are not reflected in \"ip -s link show\" / \"ifconfig \u003cvf\u003e\" commands (BZ#1889301)\n\n* [mlx5] IPV6 TOS rewrite flows are not getting offloaded in HW (BZ#1897689)\n\n* RHEL 8.1 - Call traces show I/O stuck for more than 120 sec when at least one path is available for NVMe/IB (BZ#1901525)\n\n* RHEL8: kernel-rt: kernel BUG at kernel/sched/deadline.c:1462! (BZ#1908732)\n\n* [Hyper-V][RHEL-8] Request to included a commit that adds a timeout to vmbus_wait_for_unload (BZ#1913529)\n\n* Host becomes unresponsive during stress-ng --cyclic test rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: (BZ#1913965)\n\n* race condition when creating child sockets from syncookies (BZ#1915530)\n\n* Missing mm backport to fix regression introduced by another mm backport (BZ#1915815)\n\n* On System Z, a hash needs state randomized for entropy extraction (BZ#1915817)\n\n* [Hyper-V][RHEL-8]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit (BZ#1917712)\n\n* kvm-rhel8.3 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. (BZ#1919886)\n\n* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap (BZ#1929909)\n\n* rpmbuild cannot build the userspace RPMs in the kernel package when the kernel itself is not built (BZ#1929911)\n\nEnhancement(s):\n\n* [Mellanox 8.4 FEAT] mlx5: Add messages when VF-LAG fails to start (BZ#1892345)\n\n* Add kernel option to change cpumask for kernel threads (BZ#1915344)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:0765", "url": "https://access.redhat.com/errata/RHSA-2021:0765" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1862849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862849" }, { "category": "external", "summary": "1877571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877571" }, { "category": "external", "summary": "1894579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894579" }, { "category": "external", "summary": "1906525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906525" }, { "category": "external", "summary": "1920474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1920474" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_0765.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T14:38:21+00:00", "generator": { "date": "2024-11-22T14:38:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:0765", "initial_release_date": "2021-03-09T11:15:08+00:00", "revision_history": [ { "date": "2021-03-09T11:15:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-03-09T11:15:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:38:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)", "product_id": "CRB-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.2::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "bpftool-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "bpftool-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-core-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debug-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-headers-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-modules-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-tools-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "perf-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "perf-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "python3-perf-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.46.1.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.46.1.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.46.1.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.46.1.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.46.1.el8_2.ppc64le",